CVE-2017-3556
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Vulnerability in the Oracle Application Object Library component of Oracle E-Business Suite (subcomponent: File Management). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Vulnerabilidad en el componente Application Object Library de Oracle E-Business Suite (subcomponente: administración de archivos). Las versiones compatibles que se ven afectadas son 12.1.3, 12.2.3, 12.2.4, 12.2.5 y 12.2.6. La vulnerabilidad de difícil explotación permite al atacante sin autenticar con acceso a la red por medio de HTTP comprometer a Application Object Library de Oracle. Los ataques con éxito de esta vulnerabilidad pueden resultar en un acceso de lectura no autorizado a un subconjunto de datos accesibles de Application Object Library de Oracle. CVSS 3.0 puntuación base 3.7 (impactos de confidencialidad). Vector CVSS:(CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
CVSS Scores
SSVC
- Decision:Attend
Timeline
- 2016-12-06 CVE Reserved
- 2017-04-24 CVE Published
- 2023-03-07 EPSS Updated
- 2024-10-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/97785 | Third Party Advisory | |
http://www.securitytracker.com/id/1038299 | Vdb Entry | |
https://erpscan.io/advisories/erpscan-17-025-auth-bypass-file-downloading-oracle-e-business-suite | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html | 2018-12-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Oracle Search vendor "Oracle" | Application Object Library Search vendor "Oracle" for product "Application Object Library" | 12.1.3 Search vendor "Oracle" for product "Application Object Library" and version "12.1.3" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Application Object Library Search vendor "Oracle" for product "Application Object Library" | 12.2.3 Search vendor "Oracle" for product "Application Object Library" and version "12.2.3" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Application Object Library Search vendor "Oracle" for product "Application Object Library" | 12.2.4 Search vendor "Oracle" for product "Application Object Library" and version "12.2.4" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Application Object Library Search vendor "Oracle" for product "Application Object Library" | 12.2.5 Search vendor "Oracle" for product "Application Object Library" and version "12.2.5" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Application Object Library Search vendor "Oracle" for product "Application Object Library" | 12.2.6 Search vendor "Oracle" for product "Application Object Library" and version "12.2.6" | - |
Affected
|