First published: Tue Jul 16 2024(Updated: )
Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: APIs). Supported versions that are affected are 12.2.6-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data as well as unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Application Object Library | >=12.2.6<=12.2.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21128 is considered to be easily exploitable with low privileges required for an attacker.
To mitigate CVE-2024-21128, it is recommended to apply the latest security updates provided by Oracle for affected versions.
CVE-2024-21128 affects Oracle Application Object Library versions 12.2.6 through 12.2.13.
Yes, CVE-2024-21128 can be exploited remotely via HTTP by a low privileged attacker.
CVE-2024-21128 impacts the APIs component of the Oracle Application Object Library in Oracle E-Business Suite.