Risk | High |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2020-9488 CVE-2020-1934 CVE-2020-9484 |
CWE-ID | CWE-295 CWE-457 CWE-502 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #3 is available. |
Vulnerable software Subscribe |
Instantis EnterpriseTrack Web applications / CRM systems |
Vendor | Oracle |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU27487
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2020-9488
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to perform man-in-the-middle attack.
The vulnerability exists due to the Apache Log4j SMTP appender does not validate SSL certificates. A remote attacker can perform a MitM attack, intercept and decrypt network traffic.
Install update from vendor's website.
Vulnerable software versionsInstantis EnterpriseTrack: 17.1 - 17.3
Fixed software versionsCPE2.3 External links
http://www.oracle.com/security-alerts/cpujul2020.html?504242
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU26528
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2020-1934
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to the "mod_proxy_ftp" may use uninitialized memory when proxying to a malicious FTP server. A remote attacker can gain unauthorized access to sensitive information on the target system.
MitigationInstall update from vendor's website.
Vulnerable software versionsInstantis EnterpriseTrack: 17.1 - 17.3
Fixed software versionsCPE2.3 External links
http://www.oracle.com/security-alerts/cpujul2020.html?504242
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU28158
Risk: High
CVSSv3.1:
CVE-ID: CVE-2020-9484
CWE-ID:
Exploit availability:
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing serialized data in uploaded files names. A remote attacker can pass specially crafted file name to the application and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system but requires that the server is configured to use PersistenceManager with a FileStore and the attacker knows relative file path from storage location.
Install update from vendor's website.
Vulnerable software versionsInstantis EnterpriseTrack: 17.1 - 17.3
Fixed software versionsCPE2.3 External links
http://www.oracle.com/security-alerts/cpujul2020.html?504242
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?