7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
Low
0.059 Low
EPSS
Percentile
93.5%
The versions of Oracle Database Server installed on the remote host are affected by multiple vulnerabilities as referenced in the July 2020 CPU advisory.
Vulnerability in the MapViewer (Apache Commons FileUpload) component of Oracle Database Server.
Supported versions that are affected are 12.2.0.1, 18c and 19c. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network access via HTTP to compromise MapViewer (Apache Commons FileUpload). Successful attacks of this vulnerability can result in takeover of MapViewer (Apache Commons FileUpload). Note: MapViewer is not deployed with a default installation. To use MapViewer the customer needs to re-deploy MapViewer EAR file into Oracle WebLogic Server. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts).
(CVE-2016-1000031)
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult to exploit vulnerability allows low privileged attacker having Create Session, Create Procedure privilege with network access via multiple protocols to compromise Java VM. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java VM, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java VM. CVSS 3.1 Base Score 8.0 (Confidentiality, Integrity and Availability impacts). (CVE-2020-2968)
Vulnerability in the Core RDBMS (zlib) component of Oracle Database Server. The supported version that is affected is 18c. Easily exploitable vulnerability allows high privileged attacker having Create Session privilege with network access via Oracle Net to compromise Core RDBMS (zlib). Successful attacks of this vulnerability can result in takeover of Core RDBMS (zlib). CVSS 3.1 Base Score 7.2 (Confidentiality, Integrity and Availability impacts).(CVE-2016-9843)
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(138528);
script_version("1.14");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/03/01");
script_cve_id(
"CVE-2016-9843",
"CVE-2016-1000031",
"CVE-2018-18314",
"CVE-2019-10086",
"CVE-2019-13990",
"CVE-2019-16943",
"CVE-2019-17569",
"CVE-2020-2513",
"CVE-2020-2968",
"CVE-2020-2969",
"CVE-2020-2971",
"CVE-2020-2972",
"CVE-2020-2973",
"CVE-2020-2974",
"CVE-2020-2975",
"CVE-2020-2976",
"CVE-2020-2977",
"CVE-2020-2978",
"CVE-2020-8112"
);
script_bugtraq_id(93604, 95131, 106145);
script_xref(name:"IAVA", value:"2020-A-0328");
script_xref(name:"CEA-ID", value:"CEA-2021-0004");
script_xref(name:"CEA-ID", value:"CEA-2021-0025");
script_xref(name:"IAVA", value:"2023-A-0559");
script_name(english:"Oracle Database Server Multiple Vulnerabilities (Jul 2020 CPU)");
script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by multiple vulnerabilities");
script_set_attribute(attribute:"description", value:
"The versions of Oracle Database Server installed on the remote host are affected by multiple vulnerabilities as
referenced in the July 2020 CPU advisory.
- Vulnerability in the MapViewer (Apache Commons
FileUpload) component of Oracle Database Server.
Supported versions that are affected are 12.2.0.1, 18c
and 19c. Easily exploitable vulnerability allows low
privileged attacker having Valid User Account privilege
with network access via HTTP to compromise MapViewer
(Apache Commons FileUpload). Successful attacks of this
vulnerability can result in takeover of MapViewer
(Apache Commons FileUpload). Note: MapViewer is not
deployed with a default installation. To use MapViewer
the customer needs to re-deploy MapViewer EAR file into
Oracle WebLogic Server. CVSS 3.1 Base Score 8.8
(Confidentiality, Integrity and Availability impacts).
(CVE-2016-1000031)
- Vulnerability in the Java VM component of Oracle
Database Server. Supported versions that are affected
are 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c and 19c. Difficult
to exploit vulnerability allows low privileged attacker
having Create Session, Create Procedure privilege with
network access via multiple protocols to compromise Java
VM. Successful attacks require human interaction from a
person other than the attacker and while the
vulnerability is in Java VM, attacks may significantly
impact additional products. Successful attacks of this
vulnerability can result in takeover of Java VM. CVSS
3.1 Base Score 8.0 (Confidentiality, Integrity and
Availability impacts). (CVE-2020-2968)
- Vulnerability in the Core RDBMS (zlib) component of
Oracle Database Server. The supported version that is
affected is 18c. Easily exploitable vulnerability allows
high privileged attacker having Create Session privilege
with network access via Oracle Net to compromise Core
RDBMS (zlib). Successful attacks of this vulnerability
can result in takeover of Core RDBMS (zlib). CVSS 3.1
Base Score 7.2 (Confidentiality, Integrity and
Availability impacts).(CVE-2016-9843)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://www.oracle.com/security-alerts/cpujul2020.html");
script_set_attribute(attribute:"solution", value:
"Apply the appropriate patch according to the July 2020 Oracle Critical Patch Update advisory.");
script_set_attribute(attribute:"agent", value:"all");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-13990");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2019-16943");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/07/14");
script_set_attribute(attribute:"patch_publication_date", value:"2020/07/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/07/16");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:database_server");
script_set_attribute(attribute:"stig_severity", value:"I");
script_set_attribute(attribute:"thorough_tests", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Databases");
script_copyright(english:"This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("oracle_rdbms_query_patch_info.nbin", "oracle_rdbms_patch_info.nbin");
exit(0);
}
include('vcf_extras_oracle.inc');
var app_info = vcf::oracle_rdbms::get_app_info();
var constraints = [
# RDBMS:
{'min_version': '19.8', 'fixed_version': '19.8.0.0.200714', 'missing_patch':'31281355', 'os':'unix', 'component':'db'},
{'min_version': '19.0', 'fixed_version': '19.8.0.0.200714', 'missing_patch':'31247621', 'os':'win', 'component':'db'},
{'min_version': '19.7', 'fixed_version': '19.7.1.0.200714', 'missing_patch':'31204483', 'os':'unix', 'component':'db'},
{'min_version': '19.0', 'fixed_version': '19.6.2.0.200714', 'missing_patch':'31212138', 'os':'unix', 'component':'db'},
{'min_version': '18.11', 'fixed_version': '18.11.0.0.200714', 'missing_patch':'31308624', 'os':'unix', 'component':'db'},
{'min_version': '18.0', 'fixed_version': '18.11.0.0.200714', 'missing_patch':'31247612', 'os':'win', 'component':'db'},
{'min_version': '18.10', 'fixed_version': '18.10.1.0.200714', 'missing_patch':'31211410', 'os':'unix', 'component':'db'},
{'min_version': '18.0', 'fixed_version': '18.9.2.0.200714', 'missing_patch':'31212186', 'os':'unix', 'component':'db'},
{'min_version': '12.2.0.1.0', 'fixed_version': '12.2.0.1.200714', 'missing_patch':'31312468, 31212219, 31199988', 'os':'unix', 'component':'db'},
{'min_version': '12.2.0.1.0', 'fixed_version': '12.2.0.1.200714', 'missing_patch':'31210848', 'os':'win', 'component':'db'},
{'min_version': '12.1.0.2.0', 'fixed_version': '12.1.0.2.200714', 'missing_patch':'31113348, 31001106', 'os':'unix', 'component':'db'},
{'min_version': '12.1.0.2.0', 'fixed_version': '12.1.0.2.200714', 'missing_patch':'31211574', 'os':'win', 'component':'db'},
{'min_version': '11.2.0.4', 'fixed_version': '11.2.0.4.200714', 'missing_patch':'31103343, 31338362, 31103314', 'os':'unix', 'component':'db'},
{'min_version': '11.2.0.4', 'fixed_version': '11.2.0.4.200414', 'missing_patch':'31169916', 'os':'win', 'component':'db'},
# OJVM:
{'min_version': '19.0', 'fixed_version': '19.8.0.0.200714', 'missing_patch':'31219897', 'os':'unix', 'component':'ojvm'},
{'min_version': '19.0', 'fixed_version': '19.8.0.0.200714', 'missing_patch':'31219897', 'os':'win', 'component':'ojvm'},
{'min_version': '18.0', 'fixed_version': '18.11.0.0.200714', 'missing_patch':'31219909', 'os':'unix', 'component':'ojvm'},
{'min_version': '18.0', 'fixed_version': '18.11.0.0.200714', 'missing_patch':'31219909', 'os':'win', 'component':'ojvm'},
{'min_version': '12.2.0.1.0', 'fixed_version': '12.2.0.1.200714', 'missing_patch':'31219919', 'os':'unix', 'component':'ojvm'},
{'min_version': '12.2.0.1.0', 'fixed_version': '12.2.0.1.200714', 'missing_patch':'31465105', 'os':'win', 'component':'ojvm'},
{'min_version': '12.1.0.2.0', 'fixed_version': '12.1.0.2.200714', 'missing_patch':'31219939', 'os':'unix', 'component':'ojvm'},
{'min_version': '12.1.0.2.0', 'fixed_version': '12.1.0.2.200714', 'missing_patch':'31465095', 'os':'win', 'component':'ojvm'},
{'min_version': '11.2.0.4', 'fixed_version': '11.2.0.4.200714', 'missing_patch':'31219953', 'os':'unix', 'component':'ojvm'},
{'min_version': '11.2.0.4', 'fixed_version': '11.2.0.4.200414', 'missing_patch':'31169933', 'os':'win', 'component':'ojvm'}
];
vcf::oracle_rdbms::check_version_and_report(app_info:app_info, severity:SECURITY_HOLE, constraints:constraints);
Vendor | Product | Version | CPE |
---|---|---|---|
oracle | database_server | cpe:/a:oracle:database_server |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9843
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18314
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10086
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13990
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17569
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2513
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2968
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2969
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2971
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2972
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2973
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2974
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2975
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2976
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2977
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2978
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8112
www.oracle.com/security-alerts/cpujul2020.html
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.5 High
AI Score
Confidence
Low
0.059 Low
EPSS
Percentile
93.5%