cve/2023/CVE-2023-21827.md

19 lines
1.5 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-21827](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21827)
![](https://img.shields.io/static/v1?label=Product&message=Database%20-%20Enterprise%20Edition&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2019c%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20low%20privileged%20attacker%20having%20Create%20Session%20privilege%20with%20network%20access%20via%20Oracle%20Net%20to%20compromise%20Oracle%20Database%20Data%20Redaction.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20Database%20Data%20Redaction%20accessible%20data.&color=brighgreen)
### Description
Vulnerability in the Oracle Database Data Redaction component of Oracle Database Server. Supported versions that are affected are 19c and 21c. Easily exploitable vulnerability allows low privileged attacker having Create Session privilege with network access via Oracle Net to compromise Oracle Database Data Redaction. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Database Data Redaction accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpujan2023.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpujan2023.html
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.