CVE-2020-14805

9.1 CRITICAL

📋 TL;DR

This vulnerability in Oracle E-Business Suite Secure Enterprise Search allows unauthenticated attackers with network access via HTTP to compromise the system. Attackers can create, delete, or modify critical data, or gain unauthorized access to all search-accessible data. Affected versions are 12.1.3 and 12.2.3 through 12.2.10.

💻 Affected Systems

Products:
  • Oracle E-Business Suite Secure Enterprise Search
Versions: 12.1.3 and 12.2.3 through 12.2.10
Operating Systems: Any OS running Oracle E-Business Suite
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Search Integration Engine component. Requires network access via HTTP to the E-Business Suite instance.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Oracle E-Business Suite Secure Enterprise Search data including unauthorized access, modification, or deletion of all critical business data accessible through the search component.

🟠

Likely Case

Unauthorized data access and manipulation of sensitive business information stored in the E-Business Suite search system.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to vulnerable systems.

🌐 Internet-Facing: HIGH - Unauthenticated network access via HTTP makes internet-facing instances extremely vulnerable to exploitation.
🏢 Internal Only: HIGH - Even internally, unauthenticated access via HTTP allows any network user to exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS indicates easily exploitable with no authentication required and low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Oracle Critical Patch Update October 2020 or later

Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2020.html

Restart Required: Yes

Instructions:

1. Download the October 2020 Critical Patch Update from Oracle Support. 2. Apply the patch to affected Oracle E-Business Suite instances. 3. Restart the application services. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Oracle E-Business Suite instances to only trusted IP addresses and networks.

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport 8000 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 8000 -j DROP

Application Firewall Rules

all

Implement web application firewall rules to block suspicious requests to the Search Integration Engine endpoints.

🧯 If You Can't Patch

  • Isolate affected systems in a segmented network zone with strict access controls
  • Implement additional authentication layers or IP whitelisting for access to the search component

🔍 How to Verify

Check if Vulnerable:

Check Oracle E-Business Suite version and patch level. If running 12.1.3 or 12.2.3-12.2.10 without October 2020 CPU, the system is vulnerable.

Check Version:

Check Oracle application version through application administration console or query database for version information.

Verify Fix Applied:

Verify that the October 2020 Critical Patch Update has been applied successfully by checking patch installation logs and version information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual search queries or data manipulation requests
  • Unauthorized access attempts to search endpoints
  • Unexpected data modifications in search-related tables

Network Indicators:

  • HTTP requests to search integration endpoints from unexpected sources
  • Unusual patterns of data access via search APIs

SIEM Query:

source="oracle-ebs" AND (uri_path="/search/*" OR uri_path="/integration/*") AND (status_code=200 OR status_code=500) AND src_ip NOT IN (trusted_ips)

🔗 References

📤 Share & Export