This affects the package json before 10.0.0. It is possible to inject arbritary commands using the parseLookup function.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
03 Dec 2022, 14:56
Type | Values Removed | Values Added |
---|---|---|
References | (N/A) https://www.oracle.com/security-alerts/cpujul2022.html - Patch, Third Party Advisory | |
CPE | cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.2.0:*:*:*:*:*:*:* cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_crime_and_compliance_management_studio:8.0.8.3.0:*:*:*:*:*:*:* |
25 Jul 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 Mar 2022, 20:40
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:oracle:timesten_in-memory_database:*:*:*:*:*:*:*:* cpe:2.3:a:oracle:financial_services_regulatory_reporting_with_agilereporter:8.0.9.6.3:*:*:*:*:*:*:* |
|
References | (MLIST) https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r37c0e1807da7ff2bdd028bbe296465a6bbb99e2320dbe661d5d8b33b@%3Cissues.zookeeper.apache.org%3E - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r3b04f4e99a19613f88ae088aa18cd271231a3c79dfff8f5efa8cda61@%3Cissues.zookeeper.apache.org%3E - Mailing List, Third Party Advisory | |
References | (N/A) https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/rb89bd82dffec49f83b49e9ad625b1b63a408b3c7d1a60d6f049142a0@%3Cissues.flink.apache.org%3E - Mailing List, Third Party Advisory |
07 Feb 2022, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-08-30 08:15
Updated : 2024-02-04 21:00
NVD link : CVE-2020-7712
Mitre link : CVE-2020-7712
CVE.ORG link : CVE-2020-7712
JSON object : View
Products Affected
joyent
- json
oracle
- financial_services_crime_and_compliance_management_studio
- timesten_in-memory_database
- commerce_guided_search
- financial_services_regulatory_reporting_with_agilereporter
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')