First published: Wed Apr 15 2020(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Oracle Business Intelligence. Authentication is not required to exploit this vulnerability. The specific flaw exists within BIRemotingServlet. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Business Intelligence Enterprise Edition | ||
Oracle Business Intelligence Enterprise Edition | =5.5.0.0.0 | |
Oracle Business Intelligence Enterprise Edition | =11.1.1.9.0 | |
Oracle Business Intelligence Enterprise Edition | =12.2.1.3.0 | |
Oracle Business Intelligence Enterprise Edition | =12.2.1.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-2950 is identified as a critical vulnerability that allows remote code execution without authentication.
To mitigate CVE-2020-2950, apply the latest security updates provided by Oracle for affected versions of Business Intelligence.
CVE-2020-2950 affects Oracle Business Intelligence versions 5.5.0.0.0, 11.1.1.9.0, 12.2.1.3.0, and 12.2.1.4.0.
Yes, CVE-2020-2950 can be exploited remotely without requiring any authentication.
The main issue for CVE-2020-2950 stems from improper validation within the BIRemotingServlet component.