Vulnerability Description
Vulnerability in the PeopleSoft Enterprise SCM eProcurement component of Oracle PeopleSoft Products (subcomponent: Manage Requisition Status). Supported versions that are affected are 9.1 and 9.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM eProcurement. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of PeopleSoft Enterprise SCM eProcurement accessible data as well as unauthorized read access to a subset of PeopleSoft Enterprise SCM eProcurement accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Oracle | Peoplesoft Enterprise Scm Eprocurement | 9.1 |
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/102610Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1040204Third Party AdvisoryVDB Entry
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlPatchVendor Advisory
- http://www.securityfocus.com/bid/102610Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1040204Third Party AdvisoryVDB Entry
FAQ
What is CVE-2018-2731?
CVE-2018-2731 is a vulnerability with a CVSS score of 5.4 (MEDIUM). Vulnerability in the PeopleSoft Enterprise SCM eProcurement component of Oracle PeopleSoft Products (subcomponent: Manage Requisition Status). Supported versions that are affected are 9.1 and 9.2. Eas...
How severe is CVE-2018-2731?
CVE-2018-2731 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-2731?
Check the references section above for vendor advisories and patch information. Affected products include: Oracle Peoplesoft Enterprise Scm Eprocurement.