First published: Wed Oct 21 2020(Updated: )
Vulnerability in the Oracle REST Data Services product of Oracle REST Data Services (component: General). Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c; Standalone ORDS: prior to 20.2.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle REST Data Services. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle REST Data Services accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle REST Data Services | <20.2.1 | |
Oracle REST Data Services | =11.2.0.4 | |
Oracle REST Data Services | =12.1.0.2 | |
Oracle REST Data Services | =12.2.0.1 | |
Oracle REST Data Services | =18c | |
Oracle REST Data Services | =19c |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-14745.
The severity of CVE-2020-14745 is medium.
The affected versions of Oracle REST Data Services are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, and 19c, as well as Standalone ORDS prior to 20.2.1.
The vulnerability allows a low privileged attacker with network access to easily exploit CVE-2020-14745.
Yes, a fix is available for CVE-2020-14745. Please refer to the Oracle Security Alert for more information.