First published: Tue Apr 23 2019(Updated: )
Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: Diagnostics). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Application Object Library | =12.1.3 | |
Oracle Application Object Library | =12.2.3 | |
Oracle Application Object Library | =12.2.4 | |
Oracle Application Object Library | =12.2.5 | |
Oracle Application Object Library | =12.2.6 | |
Oracle Application Object Library | =12.2.7 | |
Oracle Application Object Library | =12.2.8 | |
=12.1.3 | ||
=12.2.3 | ||
=12.2.4 | ||
=12.2.5 | ||
=12.2.6 | ||
=12.2.7 | ||
=12.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2621 is classified as an easily exploitable vulnerability that allows unauthenticated attackers to gain unauthorized access.
To remediate CVE-2019-2621, you should apply the latest patch provided by Oracle for affected versions of the application.
CVE-2019-2621 affects Oracle Application Object Library versions 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7, and 12.2.8.
CVE-2019-2621 enables unauthenticated remote attackers to execute malicious actions on the affected systems.
While the best course of action is to apply the patch, consider restricting network access to the affected services as a temporary workaround.