CVE-2020-2555

Vulnerability in the Oracle Coherence product of Oracle Fusion Middleware (component: Caching,CacheStore,Invocation). Supported versions that are affected are 3.7.1.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle Coherence. Successful attacks of this vulnerability can result in takeover of Oracle Coherence. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
References
Link Resource
http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/cpujan2020.html Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2021.html Vendor Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Vendor Advisory
https://www.oracle.com/security-alerts/cpujul2021.html Patch Vendor Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html Patch Vendor Advisory
http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html Exploit Third Party Advisory VDB Entry
https://www.oracle.com/security-alerts/cpujan2020.html Vendor Advisory
https://www.oracle.com/security-alerts/cpujan2021.html Vendor Advisory
https://www.oracle.com/security-alerts/cpujul2020.html Vendor Advisory
https://www.oracle.com/security-alerts/cpujul2021.html Patch Vendor Advisory
https://www.oracle.com/security-alerts/cpuoct2020.html Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:oracle:access_manager:11.1.2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:coherence:3.7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:coherence:12.1.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:coherence:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:coherence:12.2.1.4.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_platform:11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_platform:11.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_platform:11.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:healthcare_data_repository:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:rapid_planning:12.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:rapid_planning:12.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_assortment_planning:15.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:retail_assortment_planning:16.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_framework:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_framework:4.2.0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_framework:4.2.0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:webcenter_portal:12.2.1.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:webcenter_portal:12.2.1.4.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:25

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157054/Oracle-Coherence-Fusion-Middleware-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157207/Oracle-WebLogic-Server-12.2.1.4.0-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157795/WebLogic-Server-Deserialization-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://www.oracle.com/security-alerts/cpujan2020.html - Vendor Advisory () https://www.oracle.com/security-alerts/cpujan2020.html - Vendor Advisory
References () https://www.oracle.com/security-alerts/cpujan2021.html - Vendor Advisory () https://www.oracle.com/security-alerts/cpujan2021.html - Vendor Advisory
References () https://www.oracle.com/security-alerts/cpujul2020.html - Vendor Advisory () https://www.oracle.com/security-alerts/cpujul2020.html - Vendor Advisory
References () https://www.oracle.com/security-alerts/cpujul2021.html - Patch, Vendor Advisory () https://www.oracle.com/security-alerts/cpujul2021.html - Patch, Vendor Advisory
References () https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Vendor Advisory () https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Vendor Advisory

02 Oct 2024, 14:24

Type Values Removed Values Added
References () https://www.oracle.com/security-alerts/cpuoct2020.html - Vendor Advisory () https://www.oracle.com/security-alerts/cpuoct2020.html - Patch, Vendor Advisory
First Time Oracle access Manager
CPE cpe:2.3:a:oracle:access_manager:11.1.2.3.0:*:*:*:*:*:*:*

25 Oct 2022, 17:58

Type Values Removed Values Added
CPE cpe:2.3:a:oracle:commerce_platform:11.2.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_platform:11.0.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:commerce_platform:11.1.0:*:*:*:*:*:*:*
References (MISC) https://www.oracle.com/security-alerts/cpujul2021.html - (MISC) https://www.oracle.com/security-alerts/cpujul2021.html - Patch, Vendor Advisory

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE NVD-CWE-noinfo CWE-502
References
  • (MISC) https://www.oracle.com/security-alerts/cpujul2021.html -

Information

Published : 2020-01-15 17:15

Updated : 2025-02-14 16:47


NVD link : CVE-2020-2555

Mitre link : CVE-2020-2555

CVE.ORG link : CVE-2020-2555


JSON object : View

Products Affected

oracle

  • commerce_platform
  • communications_diameter_signaling_router
  • healthcare_data_repository
  • webcenter_portal
  • coherence
  • retail_assortment_planning
  • access_manager
  • rapid_planning
  • utilities_framework
CWE
CWE-502

Deserialization of Untrusted Data