First published: Thu Oct 19 2017(Updated: )
Vulnerability in the Oracle Business Intelligence Enterprise Edition component of Oracle Fusion Middleware (subcomponent: Analytics Web General). Supported versions that are affected are 11.1.1.7.0, 11.1.1.9.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Business Intelligence Enterprise Edition, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data as well as unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Business Intelligence Enterprise Edition | =11.1.1.7.0 | |
Oracle Business Intelligence Enterprise Edition | =11.1.1.9.0 | |
Oracle Business Intelligence Enterprise Edition | =12.2.1.1.0 | |
Oracle Business Intelligence Enterprise Edition | =12.2.1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10060 is considered an easily exploitable vulnerability that can lead to unauthorized access.
To fix CVE-2017-10060, upgrade your Oracle Business Intelligence Enterprise Edition to the latest patched version.
The affected versions for CVE-2017-10060 are 11.1.1.7.0, 11.1.1.9.0, 12.2.1.1.0, and 12.2.1.2.0.
Organizations using the vulnerable versions of Oracle Business Intelligence Enterprise Edition are at risk from CVE-2017-10060.
Yes, CVE-2017-10060 allows unauthenticated remote attackers to exploit the vulnerability.