First published: Tue Jul 23 2019(Updated: )
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Activity Guide). Supported versions that are affected are 8.55, 8.56 and 8.57. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle PeopleSoft Enterprise PT PeopleTools | =8.55 | |
Oracle PeopleSoft Enterprise PT PeopleTools | =8.56 | |
Oracle PeopleSoft Enterprise PT PeopleTools | =8.57 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2772 is considered an easily exploitable vulnerability that allows unauthenticated attackers to compromise Oracle PeopleSoft Products.
To fix CVE-2019-2772, it is recommended to apply the latest patches provided by Oracle for affected PeopleSoft versions 8.55, 8.56, and 8.57.
The affected versions include Oracle PeopleSoft Enterprise PeopleTools 8.55, 8.56, and 8.57.
Yes, CVE-2019-2772 allows an unauthenticated attacker with network access via HTTP to exploit the vulnerability.
CVE-2019-2772 impacts the Activity Guide component within the PeopleTools framework of Oracle PeopleSoft.