Update CVE-2014-4210.yaml

patch-1
Ritik Chaddha 2023-11-27 17:16:42 +05:30 committed by GitHub
parent 91e0eab7af
commit 0c88060426
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 6 additions and 7 deletions

View File

@ -1,12 +1,12 @@
id: CVE-2014-4210
info:
name: Oracle Weblogic - SSRF in SearchPublicRegistries.jsp
name: Oracle Weblogic - Server-Side Request Forgery
author: princechaddha
severity: medium
description: An unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services.
remediation: |
Apply the latest patches and updates provided by Oracle to fix the SSRF vulnerability
description: |
An unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.0.2.0 and 10.3.6.0 allows remote attackers to affect confidentiality via vectors related to WLS - Web Services.
remediation: Apply the latest patches and updates provided by Oracle to fix the SSRF vulnerability
reference:
- https://www.oracle.com/security-alerts/cpujul2014.html
- https://nvd.nist.gov/vuln/detail/CVE-2014-4210
@ -25,7 +25,8 @@ info:
max-request: 1
vendor: oracle
product: fusion_middleware
tags: seclists,cve,cve2014,weblogic,oracle,ssrf,oast
shodan-query: title:"Weblogic"
tags: cve,cve2014,weblogic,oracle,ssrf,oast
http:
- method: GET
@ -42,9 +43,7 @@ http:
- type: word
part: body
words:
- "SetupUDDIExplorer.jsp"
- "Search public registries"
condition: and
- type: status
status: