There is a vulnerability in knockout before version 3.5.0-beta, where after escaping the context of the web application, the web application delivers data to its users along with other trusted dynamic content, without validating it.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14862 | Issue Tracking Patch Third Party Advisory |
https://snyk.io/vuln/npm:knockout:20180213 | Exploit Third Party Advisory |
https://www.oracle.com/security-alerts/cpuapr2022.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujan2021.html | Patch Third Party Advisory |
https://www.oracle.com/security-alerts/cpujul2020.html | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
07 Jun 2022, 18:41
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.oracle.com/security-alerts/cpuapr2022.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujan2021.html - Patch, Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Patch, Third Party Advisory | |
CPE | cpe:2.3:a:oracle:goldengate:12.3.0.1.2:*:*:*:*:*:*:* cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:* cpe:2.3:a:oracle:business_intelligence:12.2.1.3.0:*:*:*:enterprise:*:*:* cpe:2.3:a:oracle:business_intelligence:5.5.0.0.0:*:*:*:enterprise:*:*:* |
|
First Time |
Oracle business Intelligence
Oracle goldengate Oracle |
20 Apr 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Jan 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2020-01-02 15:15
Updated : 2023-12-10 13:13
NVD link : CVE-2019-14862
Mitre link : CVE-2019-14862
CVE.ORG link : CVE-2019-14862
JSON object : View
Products Affected
oracle
- goldengate
- business_intelligence
redhat
- decision_manager
- process_automation
knockoutjs
- knockout
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')