First published: Wed Oct 21 2020(Updated: )
Vulnerability in the Oracle Application Express Quick Poll component of Oracle Database Server. The supported version that is affected is Prior to 20.2. Easily exploitable vulnerability allows low privileged attacker having Valid User Account privilege with network access via HTTP to compromise Oracle Application Express Quick Poll. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express Quick Poll, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express Quick Poll accessible data as well as unauthorized read access to a subset of Oracle Application Express Quick Poll accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Application Express | <20.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14763 is considered an easily exploitable vulnerability that impacts multiple versions of Oracle Application Express prior to 20.2.
To fix CVE-2020-14763, upgrade Oracle Application Express to version 20.2 or later.
Any user with a valid account and network access via HTTP is at risk of exploitation from CVE-2020-14763.
CVE-2020-14763 allows low privileged attackers to compromise Oracle Database Server through the vulnerable Quick Poll component.
Yes, CVE-2020-14763 can be remotely exploited by attackers with valid user privileges.