SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle PeopleSoft Products Vendors:   Oracle
Oracle PeopleSoft Products Multiple Bugs Let Remote Users Partially Modify Data and Local and Remote Authenticated Users Partially Access Data
SecurityTracker Alert ID:  1032125
SecurityTracker URL:  http://securitytracker.com/id/1032125
CVE Reference:   CVE-2015-0453, CVE-2015-0472, CVE-2015-0485, CVE-2015-0487, CVE-2015-0496, CVE-2015-0497   (Links to External Site)
Date:  Apr 15 2015
Impact:   Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 8.53, 8.54, 9.1, 9.2
Description:   Multiple vulnerabilities were reported in Oracle PeopleSoft Products. A remote user can partially modify data on the target system. A remote authenticated user can partially access data on the target system. A local user can partially access data on the target system.

A remote user can exploit a flaw in the PeopleSoft Enterprise Portal Interaction Hub Enterprise Portal component to partially modify data [CVE-2015-0497].

A remote authenticated user can exploit a flaw in the PeopleSoft Enterprise PeopleTools PIA Core Technology component to partially modify data [CVE-2015-0487].

A remote authenticated user can exploit a flaw in the PeopleSoft Enterprise PeopleTools PIA Core Technology component to partially modify data [CVE-2015-0472].

A remote authenticated user can exploit a flaw in the PeopleSoft Enterprise PeopleTools PIA Search Functionality component to partially access data [CVE-2015-0496].

A remote authenticated user can exploit a flaw in the PeopleSoft Enterprise SCM Strategic Sourcing Security component to partially access data [CVE-2015-0485].

A local user can exploit a flaw in the PeopleSoft Enterprise PeopleTools Portal component to partially access data [CVE-2015-0453].

The following researchers reported these and other Oracle product vulnerabilities:

An Anonymous Reporter working at HTL Leonding; Brandon Vincent; Christopher E. Walter; Daniel Ekberg of Swedish Public Employment Service; David Litchfield of Datacom TSS; Dmitry Janushkevich of Secunia Research; Florian Weimer of Red Hat;
Francis Provencher of Protek Research Lab; Jihui Lu of KeenTeam; Lupin LanYuShi; Mark Litchfield of Securatary; Markus Millbourn of Digifort; Martin Carpenter of Citco; Mateusz Jurczyk of Google Project Zero; Michael Miller of Integrigy;
Moshe Zioni of Comsec Consulting; Ofer Maor formerly of Hacktics; Paul M. Wright; Robbe De Keyzer of The Security Factory; Roberto Soares of Conviso Application Security; Sajith Shetty; Sasha Raljic; Shai Rod of Avnet Information Security;
Steven Seeley of HP's Zero Day Initiative; Tudor Enache of Help AG; Vishal V. Sonar of Control Case International Pvt Ltd.; and Wouter Coekaerts.

Impact:   A remote user can partially modify data on the target system.

A remote authenticated user can partially access data on the target system.

A local user can partially access data on the target system.

Solution:   The vendor has issued a fix as part of Oracle Critical Patch Update Advisory - April 2015.

The vendor's advisory is available at:

http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html

Vendor URL:  www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html (Links to External Site)
Cause:   Not specified
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), UNIX (Tru64), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC