First published: Wed Apr 15 2020(Updated: )
Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Workflow Notification Mailer). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Workflow. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Workflow accessible data. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Workflow | >=12.2.3<=12.2.9 | |
Oracle Workflow | =12.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-2753 is medium (5.3).
The affected software for CVE-2020-2753 is Oracle Workflow versions 12.1.3 and 12.2.3-12.2.9.
An unauthenticated attacker with network access via HTTP can easily exploit CVE-2020-2753 to compromise Oracle Workflow.
The reference for CVE-2020-2753 is [here](https://www.oracle.com/security-alerts/cpuapr2020.html).
To fix CVE-2020-2753, apply the necessary patches provided by Oracle.