发布时间 :2018-04-18 22:29:07
修订时间 :2018-04-27 10:50:56

[原文]Vulnerability in the Oracle General Ledger component of Oracle E-Business Suite (subcomponent: Consolidation Hierarchy Viewer). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle General Ledger. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle General Ledger accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).



- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: NETWORK [攻击者不需要获取内网访问权或本地访问权]
身份认证: NONE [漏洞利用无需身份认证]

- CWE (弱点类目)

CWE-284 [访问控制不恰当]

- CPE (受影响的平台与产品)

cpe:/a:oracle:e-business_suite:12.1.1Oracle E-Business Suite 12.1.1
cpe:/a:oracle:e-business_suite:12.1.2Oracle E-Business Suite 12.1.2
cpe:/a:oracle:e-business_suite:12.1.3Oracle E-Business Suite 12.1.3

- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD

- 其它链接及资源

- 漏洞信息

Oracle E-Business Suite CVE-2018-2865 Remote Security Vulnerability
Unknown 103869
Yes No
2018-04-17 12:00:00 2018-04-17 12:00:00
Juan Pablo Perez Etchegoyen of Onapsis

- 受影响的程序版本

Oracle E-Business Suite 12.2.7
Oracle E-Business Suite 12.2.6
Oracle E-Business Suite 12.2.3
Oracle E-Business Suite 12.1.2
Oracle E-Business Suite 12.1.1
Oracle E-Business Suite 12.2.5
Oracle E-Business Suite 12.2.4
Oracle E-Business Suite 12.1.3

- 漏洞讨论

Oracle E-Business Suite is prone to a remote security vulnerability in 'General Ledger' product.

This vulnerability affects the 'Consolidation Hierarchy Viewer' component and can be exploited over the 'HTTP' protocol.

This vulnerability affects the following supported versions:
12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, and 12.2.7

- 漏洞利用

Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at:

- 解决方案

Updates are available. Please see the references or vendor advisory for more information.

- 相关参考