First published: Thu Oct 19 2017(Updated: )
Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Diagnostics). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Application Object Library | =12.1.3 | |
Oracle Application Object Library | =12.2.3 | |
Oracle Application Object Library | =12.2.4 | |
Oracle Application Object Library | =12.2.5 | |
Oracle Application Object Library | =12.2.6 | |
Oracle Application Object Library | =12.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10331 is classified as a high severity vulnerability that allows unauthenticated attackers to exploit the Oracle Application Object Library.
To fix CVE-2017-10331, you should apply the latest patch provided by Oracle for affected versions of the Oracle Application Object Library.
CVE-2017-10331 affects Oracle Application Object Library versions 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, and 12.2.7.
Yes, CVE-2017-10331 can be easily exploited by an unauthenticated attacker with network access.
No specific workarounds are recommended for CVE-2017-10331; the best course of action is to apply the necessary security updates.