8.2
Advisory Published
Updated

CVE-2020-2591

First published: Wed Jan 15 2020(Updated: )

Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Application Service). The supported version that is affected is 12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Web Applications Desktop Integrator. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Web Applications Desktop Integrator, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Web Applications Desktop Integrator accessible data as well as unauthorized update, insert or delete access to some of Oracle Web Applications Desktop Integrator accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).

Credit: secalert_us@oracle.com

Affected SoftwareAffected VersionHow to fix
Oracle Web Applications Desktop Integrator=12.1.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-2591?

    CVE-2020-2591 is a vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite that allows an unauthenticated attacker with network access via HTTPS to compromise Oracle Web Applications Desktop Integrator.

  • What is the severity of CVE-2020-2591?

    The severity of CVE-2020-2591 is high with a severity value of 8.2 out of 10.

  • Which software versions are affected by CVE-2020-2591?

    The Oracle Web Applications Desktop Integrator version 12.1.3 is affected by CVE-2020-2591.

  • How can the CVE-2020-2591 vulnerability be exploited?

    The CVE-2020-2591 vulnerability can be easily exploited by an unauthenticated attacker with network access via HTTPS.

  • Is there a fix available for CVE-2020-2591?

    Please refer to the referenced link for information about available fixes for CVE-2020-2591.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203