First published: Wed Jan 15 2020(Updated: )
Vulnerability in the Oracle Reports Developer product of Oracle Fusion Middleware (component: Security and Authentication). Supported versions that are affected are 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Reports Developer. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Reports Developer, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Reports Developer accessible data as well as unauthorized read access to a subset of Oracle Reports Developer accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Reports Developer | =12.2.1.3.0 | |
Oracle Reports Developer | =12.2.1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-2533 is medium.
Versions 12.2.1.3.0 and 12.2.1.4.0 of Oracle Reports Developer are affected by CVE-2020-2533.
An unauthenticated attacker with network access via HTTP can exploit CVE-2020-2533.
No, authentication is not required to exploit CVE-2020-2533.
You can find more information about CVE-2020-2533 on the Oracle Security Alerts page: https://www.oracle.com/security-alerts/cpujan2020.html