SB2020052552 - Multiple vulnerabilities in Oracle E-Business Intelligence



SB2020052552 - Multiple vulnerabilities in Oracle E-Business Intelligence

Published: May 25, 2020

Security Bulletin ID SB2020052552
Severity
Medium
Patch available
YES
Number of vulnerabilities 10
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 10 secuirty vulnerabilities.


1) Improper input validation (CVE-ID: CVE-2016-0569)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Overview Page/Report Rendering component in Oracle E-Business Intelligence. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.


2) Improper input validation (CVE-ID: CVE-2016-0567)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Embedded Data Warehouse component in Oracle E-Business Intelligence. A remote non-authenticated attacker can exploit this vulnerability to gain access to sensitive information.


3) Improper input validation (CVE-ID: CVE-2016-0564)

The vulnerability allows a remote authenticated user to read and manipulate data.

The vulnerability exists due to improper input validation within the Overview Page/Report Rendering component in Oracle E-Business Intelligence. A remote authenticated user can exploit this vulnerability to read and manipulate data.


4) Improper input validation (CVE-ID: CVE-2016-0561)

The vulnerability allows a remote authenticated user to read and manipulate data.

The vulnerability exists due to improper input validation within the Definition component in Oracle E-Business Intelligence. A remote authenticated user can exploit this vulnerability to read and manipulate data.


5) Improper input validation (CVE-ID: CVE-2016-0553)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The vulnerability exists due to improper input validation within the Definition component in Oracle E-Business Intelligence. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.


6) Improper input validation (CVE-ID: CVE-2016-0549)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The vulnerability exists due to improper input validation within the Common Components component in Oracle E-Business Intelligence. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.


7) Improper input validation (CVE-ID: CVE-2016-0548)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The vulnerability exists due to improper input validation within the Common Components component in Oracle E-Business Intelligence. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.


8) Improper input validation (CVE-ID: CVE-2016-0547)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The vulnerability exists due to improper input validation within the Common Components component in Oracle E-Business Intelligence. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.


9) Improper input validation (CVE-ID: CVE-2016-0511)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The vulnerability exists due to improper input validation within the Common Components component in Oracle E-Business Intelligence. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.


10) Improper input validation (CVE-ID: CVE-2016-0510)

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

The vulnerability exists due to improper input validation within the Business Views Catalog component in Oracle E-Business Intelligence. A remote non-authenticated attacker can exploit this vulnerability to read and manipulate data.


Remediation

Install update from vendor's website.