First published: Tue Apr 23 2019(Updated: )
Vulnerability in the Oracle Work in Process component of Oracle E-Business Suite (subcomponent: Messages). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Work in Process. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Work in Process accessible data as well as unauthorized access to critical data or complete access to all Oracle Work in Process accessible data. CVSS 3.0 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L).
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Work in Process | =12.1.1 | |
Oracle Work in Process | =12.1.2 | |
Oracle Work in Process | =12.1.3 | |
Oracle Work in Process | =12.2.3 | |
Oracle Work in Process | =12.2.4 | |
Oracle Work in Process | =12.2.5 | |
Oracle Work in Process | =12.2.6 | |
Oracle Work in Process | =12.2.7 | |
Oracle Work in Process | =12.2.8 | |
=12.1.1 | ||
=12.1.2 | ||
=12.1.3 | ||
=12.2.3 | ||
=12.2.4 | ||
=12.2.5 | ||
=12.2.6 | ||
=12.2.7 | ||
=12.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2633 is classified as an easily exploitable vulnerability allowing low privileged attackers network access.
To fix CVE-2019-2633, apply the latest security updates provided by Oracle for affected versions of Oracle Work in Process.
CVE-2019-2633 affects Oracle Work in Process versions 12.1.1 through 12.2.8.
CVE-2019-2633 can allow unauthorized actions to be performed by an attacker with low privileges within Oracle E-Business Suite.
Yes, CVE-2019-2633 is considered easily exploitable by a low privileged attacker with network access.