vulnerability
Oracle WebLogic: CVE-2019-11358 : Critical Patch Update
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
4 | (AV:N/AC:M/Au:N/C:N/I:P/A:N) | Apr 20, 2019 | Oct 17, 2019 | Jan 16, 2020 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Apr 20, 2019
Added
Oct 17, 2019
Modified
Jan 16, 2020
Description
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
Solution(s)
oracle-weblogic-oct-2019-cpu-12_1_3_0_0oracle-weblogic-oct-2019-cpu-12_2_1_3_0
References
- BID-108023
- CVE-2019-11358
- https://attackerkb.com/topics/CVE-2019-11358
- DEBIAN-DSA-4434
- DEBIAN-DSA-4460
- REDHAT-RHBA-2019:1570
- REDHAT-RHSA-2019:1456
- REDHAT-RHSA-2019:2587
- REDHAT-RHSA-2019:3023
- REDHAT-RHSA-2019:3024
- URL-http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- URL-https://support.oracle.com/rs?type=doc&id=2568292.1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.