First published: Tue Apr 16 2024(Updated: )
Vulnerability in the Oracle Workflow product of Oracle E-Business Suite (component: Admin Screens and Grants UI). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Workflow. While the vulnerability is in Oracle Workflow, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Workflow. CVSS 3.1 Base Score 9.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Workflow | >=12.2.3<=12.2.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21071 is considered an easily exploitable vulnerability that allows a high privileged attacker to compromise Oracle Workflow.
To fix CVE-2024-21071, it's recommended to apply the latest security patches provided by Oracle for affected versions of the Oracle E-Business Suite.
CVE-2024-21071 affects Oracle Workflow in versions 12.2.3 to 12.2.13 of the Oracle E-Business Suite.
CVE-2024-21071 can be exploited by high privileged attackers who have network access via HTTP.
CVE-2024-21071 impacts the Admin Screens and Grants UI component of the Oracle Workflow product.