DNA View

CVE-2025-21507

Medium
Low Medium High Critical
5.4
CVSS Score
Published: Jan 21, 2025
Last Modified: Mar 17, 2025

Vulnerability Description

Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in JD Edwards EnterpriseOne Tools, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of JD Edwards EnterpriseOne Tools accessible data as well as unauthorized read access to a subset of JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).

CVSS Metrics

Common Vulnerability Scoring System

Vector String:

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Attack Vector
N
Attack Complexity
L
Privileges Required
L
User Interaction
R
Scope
C
Confidentiality
L
Integrity
L
Availability
N

Known Affected Software

19 configuration(s) from 1 vendor(s)

jd_edwards_enterpriseone_tools
Version:
9.2.8.1
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.8.1:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.8.2
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.8.2:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.5.3
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.5.3:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.6.0
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.6.0:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.6.1
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.6.1:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.6.3
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.6.3:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.0.0
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.0.0:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.1
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.1:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.6.4
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.6.4:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.1.5
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.1.5:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
4.0.1.0
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:4.0.1.0:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.4.2
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.4.2:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.7.4
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.7.4:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.8.0
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.8.0:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.7.3
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.7.3:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.4.0
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.4.0:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
8.98
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:8.98:*:*:*:*:*:*:*
jd_edwards_enterpriseone_tools
Version:
9.2.5.0
CPE:
cpe:2.3:a:oracle:jd_edwards_enterpriseone_tools:9.2.5.0:*:*:*:*:*:*:*
This vulnerability affects 19 software configuration(s). Ensure you patch all affected systems.

Available Security Patches

1 patch available from vendors

View All Patches
Oracle

CPUJAN2025

Oracle Critical Patch Update Advisory - January 2025

Severity
Critical
Released
Jan 21, 2025
Restart Required
Security Update

Severity Details

5.4
out of 10.0
Medium

Weakness Type (CWE)

CWE-352 Top 25 #4

Cross-Site Request Forgery (CSRF)

Description
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Exploit Likelihood
Medium
Typical Severity
High
OWASP Top 10
A01:2021-Broken Access Control
Abstraction Level
Compound

Key Information

Published Date
January 21, 2025