cve/2023/CVE-2023-21825.md
2024-06-18 02:51:15 +02:00

18 lines
1.4 KiB
Markdown

### [CVE-2023-21825](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21825)
![](https://img.shields.io/static/v1?label=Product&message=iSupplier%20Portal&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2012.2.6-12.2.8%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20unauthenticated%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Oracle%20iSupplier%20Portal.%20%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Oracle%20iSupplier%20Portal%20accessible%20data.&color=brighgreen)
### Description
Vulnerability in the Oracle iSupplier Portal product of Oracle E-Business Suite (component: Supplier Management). Supported versions that are affected are 12.2.6-12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iSupplier Portal. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle iSupplier Portal accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
### POC
#### Reference
- https://www.oracle.com/security-alerts/cpujan2023.html
#### Github
No PoCs found on GitHub currently.