cve/2023/CVE-2023-22012.md

18 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-22012](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22012)
![](https://img.shields.io/static/v1?label=Product&message=Business%20Intelligence%20Enterprise%20Edition&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%207.0.0.0.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20Business%20Intelligence%20Enterprise%20Edition.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20update%2C%20insert%20or%20delete%20access%20to%20some%20of%20Oracle%20Business%20Intelligence%20Enterprise%20Edition%20accessible%20data.&color=brighgreen)
### Description
Vulnerability in the Oracle Business Intelligence Enterprise Edition product of Oracle Analytics (component: Analytics Server). The supported version that is affected is 7.0.0.0.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Business Intelligence Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Business Intelligence Enterprise Edition accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N).
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpujul2023.html
#### Github
No PoCs found on GitHub currently.