Vulnerabilities > CVE-2018-2715 - Unspecified vulnerability in Oracle Business Intelligence 12.2.1.2.0/12.2.1.3.0
Summary
Vulnerability in the Oracle Business Intelligence Enterprise Edition component of Oracle Fusion Middleware (subcomponent: BI Platform Security). Supported versions that are affected are 12.2.1.2.0 and 12.2.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
Nessus
NASL family Misc. NASL id ORACLE_BI_PUBLISHER_JAN_2018_CPU.NASL description The version of Oracle Business Intelligence Publisher running on the remote host is 11.1.1.9.x prior to 11.1.1.9.180116 or 12.2.1.2.x prior to 12.2.1.2.180116 or 12.2.1.3.x prior to 12.2.1.3.180116. It is, therefore, affected by multiple vulnerabilities as noted in the January 2018 Critical Patch Update advisory. The Oracle Business Intelligence Publisher installed on the remote host is affected by multiple vulnerabilities: - An improper restriction of the lifetime of queues entries associated with unused our-of-order messages allows an remote attacker to cause a denial of service in the DTLS implementationof OpenSSL before 1.1.0 (CVE-2016-2179). - An easily exploitable vulnerability allows an unauthenticated attacker with network access to compromise Oracle Business Intelligence Enterprise Edition via HTTP. A Successful attack of this vulnerability would result in unauthorized access to data as well as unauthorized update, insert or delete. This attack would required human interaction. (CVE-2017-10068). - An low privileged attacker with network access via HTTP can exploit a vulnerability in Oracle Business Intelligence Enterprise Edition. A successful attack would allow the unauthorized access to critical data (CVE-2018-2715). Note that Nessus has not tested for these issues but has instead relied only on the application last seen 2020-05-31 modified 2018-12-27 plugin id 119885 published 2018-12-27 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/119885 title Oracle Business Intelligence Publisher Multiple Vulnerabilities (January 2018 CPU) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(119885); script_version("1.6"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/05/27"); script_cve_id( "CVE-2017-10068", "CVE-2018-2715", "CVE-2016-2179" ); script_bugtraq_id( 102535, 102558, 92987 ); script_name(english:"Oracle Business Intelligence Publisher Multiple Vulnerabilities (January 2018 CPU)"); script_set_attribute(attribute:"synopsis", value: "The remote host is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "The version of Oracle Business Intelligence Publisher running on the remote host is 11.1.1.9.x prior to 11.1.1.9.180116 or 12.2.1.2.x prior to 12.2.1.2.180116 or 12.2.1.3.x prior to 12.2.1.3.180116. It is, therefore, affected by multiple vulnerabilities as noted in the January 2018 Critical Patch Update advisory. The Oracle Business Intelligence Publisher installed on the remote host is affected by multiple vulnerabilities: - An improper restriction of the lifetime of queues entries associated with unused our-of-order messages allows an remote attacker to cause a denial of service in the DTLS implementationof OpenSSL before 1.1.0 (CVE-2016-2179). - An easily exploitable vulnerability allows an unauthenticated attacker with network access to compromise Oracle Business Intelligence Enterprise Edition via HTTP. A Successful attack of this vulnerability would result in unauthorized access to data as well as unauthorized update, insert or delete. This attack would required human interaction. (CVE-2017-10068). - An low privileged attacker with network access via HTTP can exploit a vulnerability in Oracle Business Intelligence Enterprise Edition. A successful attack would allow the unauthorized access to critical data (CVE-2018-2715). Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number."); # https://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?7ee54bd8"); script_set_attribute(attribute:"solution", value: "Apply the appropriate patch according to the January 2018 Oracle Critical Patch Update advisory."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-10068"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"vuln_publication_date", value:"2018/01/17"); script_set_attribute(attribute:"patch_publication_date", value:"2018/01/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/12/27"); script_set_attribute(attribute:"plugin_type", value:"combined"); script_set_attribute(attribute:"agent", value:"all"); script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:fusion_middleware"); script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:business_intelligence_publisher"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Misc."); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("oracle_bi_publisher_installed.nbin", "oracle_bi_publisher_detect.nasl"); script_require_keys("installed_sw/Oracle Business Intelligence Publisher"); exit(0); } include('vcf.inc'); include('vcf_extras.inc'); appname = 'Oracle Business Intelligence Publisher'; app_info = vcf::get_app_info(app:appname); # 11.1.1.9.x - Bundle: 27281232 | Patch: 27321329 # 12.2.1.2.x - Bundle: 27072632 | Patch: 27072632 # 12.2.1.3.x - Bundle: 26796833 | Patch: 26796833 constraints = [ {'min_version': '11.1.1.9', 'fixed_version': '11.1.1.9.180116', 'patch': '27321329', 'bundle': '27281232'}, {'min_version': '12.2.1.2', 'fixed_version': '12.2.1.2.180116', 'patch': '27072632', 'bundle': '28500593'}, {'min_version': '12.2.1.3', 'fixed_version': '12.2.1.3.180116', 'patch': '26796833', 'bundle': '26796833'} ]; vcf::oracle_bi_publisher::check_version_and_report(app_info: app_info, constraints:constraints, severity:SECURITY_WARNING);
NASL family Web Servers NASL id SUN_JAVA_WEB_SERVER_7_0_27.NASL description According to its self-reported version, the Oracle iPlanet Web Server (formerly known as Sun Java System Web Server) running on the remote host is 7.0.x prior to 7.0.27 Patch 26834070. It is, therefore, affected by an unspecified vulnerability in the Network Security Services (NSS) library with unknown impact. last seen 2020-06-01 modified 2020-06-02 plugin id 106349 published 2018-01-25 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/106349 title Oracle iPlanet Web Server 7.0.x < 7.0.27 NSS Unspecified Vulnerability (January 2018 CPU) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if (description) { script_id(106349); script_version("1.7"); script_cvs_date("Date: 2019/11/08"); script_cve_id( "CVE-2015-7501", "CVE-2015-7940", "CVE-2016-0635", "CVE-2016-1182", "CVE-2016-2107", "CVE-2016-2179", "CVE-2017-3732", "CVE-2017-5645", "CVE-2017-9798", "CVE-2017-10068", "CVE-2017-10262", "CVE-2017-10273", "CVE-2017-10352", "CVE-2017-12617", "CVE-2018-2561", "CVE-2018-2564", "CVE-2018-2584", "CVE-2018-2594", "CVE-2018-2595", "CVE-2018-2596", "CVE-2018-2601", "CVE-2018-2610", "CVE-2018-2625", "CVE-2018-2711", "CVE-2018-2713", "CVE-2018-2715", "CVE-2018-2733" ); script_bugtraq_id( 78215, 79091, 89760, 91067, 91869, 92987, 95814, 97702, 98050, 100872, 100954, 102442, 102535, 102539, 102541, 102545, 102550, 102553, 102558, 102562, 102565, 102567, 102569, 102573, 102634, 102637, 102641, 102643 ); script_name(english:"Oracle iPlanet Web Server 7.0.x < 7.0.27 NSS Unspecified Vulnerability (January 2018 CPU)"); script_summary(english:"Checks the version in the admin console."); script_set_attribute(attribute:"synopsis", value: "The remote web server is affected by an unspecified vulnerability."); script_set_attribute(attribute:"description", value: "According to its self-reported version, the Oracle iPlanet Web Server (formerly known as Sun Java System Web Server) running on the remote host is 7.0.x prior to 7.0.27 Patch 26834070. It is, therefore, affected by an unspecified vulnerability in the Network Security Services (NSS) library with unknown impact."); # http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?ae82f1b1"); # https://support.oracle.com/epmos/faces/SearchDocDisplay?_adf.ctrl-state=14v5w3zyq8_4&_afrLoop=466151680153736#babhdcfj script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?fccabced"); script_set_attribute(attribute:"solution", value: "Upgrade to Oracle iPlanet Web Server version 7.0.27 or later as referenced in the January 2018 Oracle Critical Patch Update advisory."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-7501"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"d2_elliot_name", value:"Apache Tomcat for Windows HTTP PUT Method File Upload"); script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'Tomcat RCE via JSP Upload Bypass'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'CANVAS'); script_set_attribute(attribute:"vuln_publication_date", value:"2017/01/17"); script_set_attribute(attribute:"patch_publication_date", value:"2017/01/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/01/25"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:iplanet_web_server"); script_set_attribute(attribute:"cpe", value:"cpe:/a:mozilla:network_security_services"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Web Servers"); script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("oracle_iplanet_web_server_detect.nbin"); script_require_keys("installed_sw/Oracle iPlanet Web Server"); exit(0); } include("global_settings.inc"); include("audit.inc"); include("misc_func.inc"); include("install_func.inc"); include("http.inc"); app_name = "Oracle iPlanet Web Server"; port = get_http_port(default:8989); install = get_single_install(app_name:app_name, port:port, exit_if_unknown_ver:TRUE); version = install['version']; fix = "7.0.27"; min = "7.0"; # Affected 7.0.x < 7.0.27 if ( ver_compare(ver:version, fix:min, strict:FALSE) >= 0 && ver_compare(ver:version, fix:fix, strict:FALSE) == -1 ) { report = report_items_str( report_items:make_array( "Installed version", version, "Fixed version", fix ), ordered_fields:make_list("Installed version", "Fixed version") ); security_report_v4(port:port, severity:SECURITY_HOLE, extra:report); } else audit(AUDIT_LISTEN_NOT_VULN, app_name, port, version);
NASL family Web Servers NASL id ORACLE_HTTP_SERVER_CPU_JAN_2018.NASL description The version of Oracle HTTP Server installed on the remote host is affected by multiple vulnerabilities as noted in the January 2018 CPU advisory. last seen 2020-03-18 modified 2018-01-24 plugin id 106299 published 2018-01-24 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/106299 title Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (January 2018 CPU) code # # (C) Tenable Network Security, Inc. # include('compat.inc'); if (description) { script_id(106299); script_version("1.16"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/25"); script_cve_id( "CVE-2015-7501", "CVE-2015-7940", "CVE-2016-0635", "CVE-2016-1182", "CVE-2016-2107", "CVE-2016-2179", "CVE-2017-3732", "CVE-2017-5461", "CVE-2017-5645", "CVE-2017-9798", "CVE-2017-10068", "CVE-2017-10262", "CVE-2017-10273", "CVE-2017-10352", "CVE-2017-12617", "CVE-2018-2561", "CVE-2018-2564", "CVE-2018-2584", "CVE-2018-2596", "CVE-2018-2601", "CVE-2018-2625", "CVE-2018-2711", "CVE-2018-2713", "CVE-2018-2715", "CVE-2018-2760" ); script_bugtraq_id( 78215, 79091, 89760, 91067, 91869, 92987, 95814, 97702, 98050, 100872, 100954, 102442, 102535, 102539, 102541, 102545, 102550, 102553, 102558, 102562, 102565, 102567, 102569, 102573, 103826 ); script_name(english:"Oracle Fusion Middleware Oracle HTTP Server Multiple Vulnerabilities (January 2018 CPU)"); script_set_attribute(attribute:"synopsis", value: "The remote web server is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "The version of Oracle HTTP Server installed on the remote host is affected by multiple vulnerabilities as noted in the January 2018 CPU advisory."); # http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html#AppendixFMW script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?6072c657"); # http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?76507bf8"); script_set_attribute(attribute:"solution", value: "Apply the appropriate patch according to the January 2018 Oracle Critical Patch Update advisory."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2015-7501"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"d2_elliot_name", value:"Apache Tomcat for Windows HTTP PUT Method File Upload"); script_set_attribute(attribute:"exploit_framework_d2_elliot", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'Tomcat RCE via JSP Upload Bypass'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'CANVAS'); script_set_attribute(attribute:"vuln_publication_date", value:"2018/01/16"); script_set_attribute(attribute:"patch_publication_date", value:"2018/01/16"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/01/24"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:fusion_middleware"); script_set_attribute(attribute:"cpe", value:"cpe:/a:oracle:http_server"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"Web Servers"); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("oracle_http_server_installed.nbin"); script_require_keys("Oracle/OHS/Installed"); exit(0); } include('oracle_http_server_patch_func.inc'); get_kb_item_or_exit('Oracle/OHS/Installed'); install_list = get_kb_list_or_exit('Oracle/OHS/*/EffectiveVersion'); install = branch(install_list, key:TRUE, value:TRUE); patches = make_array(); patches['11.1.1.7'] = make_array('fix_ver', '11.1.1.7.180116', 'patch', '27197885'); patches['11.1.1.9'] = make_array('fix_ver', '11.1.1.9.180116', 'patch', '27301611'); patches['12.1.3.0'] = make_array('fix_ver', '12.1.3.0.190130', 'patch', '27244723'); patches['12.2.1.2'] = make_array('fix_ver', '12.2.1.2.171220', 'patch', '27198002'); patches['12.2.1.3'] = make_array('fix_ver', '12.2.1.3.171117', 'patch', '27149535'); oracle_http_server_check_vuln( install : install, min_patches : patches, severity : SECURITY_HOLE );
References
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.securityfocus.com/bid/102558
- http://www.securityfocus.com/bid/102558
- http://www.securitytracker.com/id/1040207
- http://www.securitytracker.com/id/1040207