First published: Tue Oct 15 2024(Updated: )
Vulnerability in the XML Database component of Oracle Database Server. Supported versions that are affected are 19.3-19.24, 21.3-21.15 and 23.4-23.5. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via HTTP to compromise XML Database. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of XML Database. CVSS 3.1 Base Score 3.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L).
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle XML Database | >19.3<=19.24 | |
Oracle XML Database | >21.3<=21.15 | |
Oracle XML Database | =23.4 | |
Oracle XML Database | =23.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21242 is an easily exploitable vulnerability that poses a significant risk due to its low privilege requirements.
To remediate CVE-2024-21242, it's advised to apply the latest security patches provided by Oracle for affected XML Database versions.
The affected versions are Oracle XML Database 19.3 to 19.24, 21.3 to 21.15, and 23.4 to 23.5.
CVE-2024-21242 can be exploited by low privileged attackers who have the Create Session privilege and network access via HTTP.
CVE-2024-21242 is a vulnerability in the XML Database component of the Oracle Database Server.