Update CVE-2020-2733.yaml

patch-1
Ritik Chaddha 2022-09-21 16:59:41 +05:30 committed by GitHub
parent 2ce6d9aa04
commit 6c8cbec390
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 7 additions and 6 deletions

View File

@ -1,19 +1,21 @@
id: CVE-2020-2733 id: CVE-2020-2733
info: info:
name: JD Edwards EnterpriseOne Tools admin password not adequately protected name: JD Edwards EnterpriseOne Tools - Admin Password Disclosure
author: DhiyaneshDk,pussycat0x author: DhiyaneshDk,pussycat0x
severity: critical severity: critical
description: Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools. description: |
Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Monitoring and Diagnostics). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in takeover of JD Edwards EnterpriseOne Tools.
reference: reference:
- https://redrays.io/cve-2020-2733-jd-edwards/ - https://redrays.io/cve-2020-2733-jd-edwards/
- https://www.oracle.com/security-alerts/cpuapr2020.html - https://www.oracle.com/security-alerts/cpuapr2020.html
- https://nvd.nist.gov/vuln/detail/CVE-2020-2733 - https://nvd.nist.gov/vuln/detail/CVE-2020-2733
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2733 classification:
cve-id: CVE-2020-2733
metadata: metadata:
verified: true verified: true
shodan-query: product:"Oracle WebLogic Server" shodan-query: port:8999 product:"Oracle WebLogic Server"
tags: cve,cve2020,oracle,weblogic tags: cve,cve2020,oracle,weblogic,disclosure
requests: requests:
- method: GET - method: GET
@ -26,7 +28,6 @@ requests:
part: body part: body
words: words:
- 'ACHCJK' - 'ACHCJK'
condition: and
- type: word - type: word
part: header part: header