// For flags

CVE-2019-2616

Oracle BI Publisher Unauthorized Access Vulnerability

Severity Score

7.2
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). Supported versions that are affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). While the vulnerability is in BI Publisher (formerly XML Publisher), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher (formerly XML Publisher) accessible data as well as unauthorized read access to a subset of BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).

Vulnerabilidad en el componente BI Publisher (anteriormente XML Publisher) de Oracle Fusion Middleware (subcomponente: BI Publisher Security). Las versiones compatibles que se ven afectadas son 11.1.1.9.0, 12.2.1.3.0 y 12.2.1.4.0. Vulnerabilidad fácilmente explotable que permite a un atacante no autenticado con acceso a la red por medio de HTTP comprometer a BI Publisher (anteriormente XML Publisher). Mientras la vulnerabilidad está en BI Publisher (anteriormente XML Publisher), los ataques pueden tener un impacto significativo en productos adicionales. Los ataques exitosos de esta vulnerabilidad pueden resultar en actualizaciones no autorizadas, insertar o eliminar el acceso a algunos de los datos accesibles de BI Publisher (anteriormente XML Publisher), así como el acceso de lectura no autorizado a un subconjunto de datos accesibles de BI Publisher (anteriormente conocido como XML Publisher). CVSS 3.0 Puntuación Base 7.2 (Impactos de confidencialidad e integridad). Vector CVSS: (CVSS:3.0/AV:N/AC:L/PR:N/ UI:N/S:C/C:L/I:L/A:N).

Oracle Business Intelligence and XML Publisher versions 11.1.1.9.0, 12.2.1.3.0, and 12.2.1.4.0 suffer from an XML external entity injection vulnerability.

Oracle BI Publisher, formerly XML Publisher, contains an unspecified vulnerability that allows for various unauthorized actions. Open-source reporting attributes this vulnerability to allowing for authentication bypass.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-14 CVE Reserved
  • 2019-04-19 CVE Published
  • 2019-04-19 First Exploit
  • 2022-03-25 Exploited in Wild
  • 2022-04-15 KEV Due Date
  • 2024-06-27 EPSS Updated
  • 2024-08-04 CVE Updated
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Oracle
Search vendor "Oracle"
Business Intelligence Publisher
Search vendor "Oracle" for product "Business Intelligence Publisher"
11.1.1.9.0
Search vendor "Oracle" for product "Business Intelligence Publisher" and version "11.1.1.9.0"
-
Affected
Oracle
Search vendor "Oracle"
Business Intelligence Publisher
Search vendor "Oracle" for product "Business Intelligence Publisher"
12.2.1.3.0
Search vendor "Oracle" for product "Business Intelligence Publisher" and version "12.2.1.3.0"
-
Affected
Oracle
Search vendor "Oracle"
Business Intelligence Publisher
Search vendor "Oracle" for product "Business Intelligence Publisher"
12.2.1.4.0
Search vendor "Oracle" for product "Business Intelligence Publisher" and version "12.2.1.4.0"
-
Affected