// For flags

CVE-2010-3594

Oracle Real User Experience Insight rsynclogdird SQL Injection Vulnerability

Severity Score

6.4
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Unspecified vulnerability in the Real User Experience Insight component in Oracle Enterprise Manager Grid Control 6.0 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Processing. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that this is SQL injection in rsynclogdird involving improper escaping of UTF-8 characters while processing log files.

Una vulnerabilidad no especificada en el componente Real User Experience Insight en Enterprise Manager Grid Control de Oracle versión 6.0, permite a los atacantes remotos afectar a la confidencialidad y la integridad por medio de vectores desconocidos relacionados con Processing. NOTA: la información anterior fue obtenida de la CPU de enero de 2011. Oracle no ha comentado las afirmaciones de un coordinador de terceros confiable de que se trata de la inyección SQL en rsynclogdird que implica el escape inapropiado de caracteres UTF-8 al procesar archivos de registro.

This vulnerability allows remote attackers to inject arbitrary SQL on vulnerable installations of Oracle Real User Experience Insight. Authentication is not required to exploit this vulnerability.
The specific flaw exists within a portion of the application which parses log files. Due to the component escaping characters improperly when inserting into a UTF-8 database, a user can inject a quote and provide arbitrary SQL statements.

*Credits: 1c239c43f521145fa8385d64a9c32243
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-09-20 CVE Reserved
  • 2011-01-18 CVE Published
  • 2023-12-18 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Enterprise Manager Grid Control
Search vendor "Oracle" for product "Enterprise Manager Grid Control"
6.0
Search vendor "Oracle" for product "Enterprise Manager Grid Control" and version "6.0"
-
Affected