First published: Fri Jan 27 2017(Updated: )
Vulnerability in the Oracle iStore component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle iStore | =12.1.1 | |
Oracle iStore | =12.1.2 | |
Oracle iStore | =12.1.3 | |
Oracle iStore | =12.2.3 | |
Oracle iStore | =12.2.4 | |
Oracle iStore | =12.2.5 | |
Oracle iStore | =12.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3287 has been classified as easily exploitable, allowing unauthenticated access for attackers.
To remediate CVE-2017-3287, Oracle recommends applying the latest patches and updates provided in their security advisory.
CVE-2017-3287 affects Oracle iStore versions 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, and 12.2.6.
Yes, CVE-2017-3287 can be exploited by unauthenticated attackers with network access via HTTP.
CVE-2017-3287 impacts the User Interface component of the Oracle iStore within the Oracle E-Business Suite.