First published: Wed Apr 15 2020(Updated: )
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Process Scheduler). Supported versions that are affected are 8.56, 8.57 and 8.58. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in PeopleSoft Enterprise PeopleTools, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise PeopleTools accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle PeopleSoft Enterprise PT PeopleTools | =8.56 | |
Oracle PeopleSoft Enterprise PT PeopleTools | =8.57 | |
Oracle PeopleSoft Enterprise PT PeopleTools | =8.58 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2797 is rated as high severity due to its potential to allow unauthenticated network access and compromise of Oracle PeopleSoft.
To mitigate CVE-2020-2797, update your Oracle PeopleSoft software to the latest version provided by Oracle.
CVE-2020-2797 affects users of Oracle PeopleSoft Enterprise PeopleTools versions 8.56, 8.57, and 8.58.
CVE-2020-2797 can be exploited through an unauthenticated remote attack via HTTP, potentially compromising the affected PeopleSoft systems.
CVE-2020-2797 is classified as a remote vulnerability, allowing exploitation over the network without local access.