CVE-2021-2195

8.2 HIGH

📋 TL;DR

This vulnerability in Oracle Partner Management allows unauthenticated attackers to access sensitive data and modify information via HTTP requests. It affects Oracle E-Business Suite versions 12.1.3 and 12.2.3-12.2.10. Successful exploitation requires human interaction from someone other than the attacker.

💻 Affected Systems

Products:
  • Oracle E-Business Suite - Oracle Partner Management
Versions: 12.1.3 and 12.2.3 through 12.2.10
Operating Systems: Any OS running Oracle E-Business Suite
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Attribute Admin Setup component specifically. Requires Oracle Partner Management module to be installed and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Oracle Partner Management data including unauthorized access to all critical information and ability to modify, insert, or delete data, potentially impacting connected systems.

🟠

Likely Case

Unauthorized access to sensitive partner management data and limited data manipulation capabilities.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing unauthenticated HTTP access.

🌐 Internet-Facing: HIGH - Unauthenticated network access via HTTP makes internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal systems still vulnerable but with reduced attack surface compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Easily exploitable according to Oracle's assessment.

Requires human interaction from a victim (UI:R in CVSS vector), suggesting some form of social engineering or user action may be needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Oracle Critical Patch Update for April 2021

Vendor Advisory: https://www.oracle.com/security-alerts/cpuapr2021.html

Restart Required: Yes

Instructions:

1. Download the April 2021 Critical Patch Update from Oracle Support. 2. Apply the patch following Oracle's E-Business Suite patching procedures. 3. Restart affected services. 4. Test functionality in non-production environment first.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Oracle Partner Management to trusted IP addresses only

# Use firewall rules to restrict access
# Example for Linux iptables:
iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

Authentication Enforcement

all

Implement additional authentication layer before accessing Oracle Partner Management

# Configure web server (Apache/Nginx) to require authentication
# Example Apache .htaccess:
AuthType Basic
AuthName "Restricted Access"
AuthUserFile /path/to/.htpasswd
Require valid-user

🧯 If You Can't Patch

  • Isolate Oracle Partner Management systems from internet access and restrict to internal network only
  • Implement web application firewall (WAF) rules to block suspicious HTTP requests to the Attribute Admin Setup component

🔍 How to Verify

Check if Vulnerable:

Check Oracle E-Business Suite version and installed modules. If running affected versions (12.1.3 or 12.2.3-12.2.10) with Oracle Partner Management installed, system is vulnerable.

Check Version:

SELECT RELEASE_NAME FROM FND_PRODUCT_GROUPS; -- Check EBS version
SELECT APPLICATION_NAME FROM FND_APPLICATION WHERE APPLICATION_SHORT_NAME = 'PN'; -- Check if Partner Management installed

Verify Fix Applied:

Verify April 2021 Critical Patch Update is applied by checking patch inventory and confirming Oracle Partner Management version is updated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to Attribute Admin Setup endpoints
  • Multiple failed authentication attempts followed by successful access
  • Unauthorized data access or modification in audit logs

Network Indicators:

  • Unusual HTTP traffic patterns to Oracle Partner Management from unexpected sources
  • Requests bypassing normal authentication flows

SIEM Query:

source="oracle-ebs-logs" AND (uri_path="*AttributeAdminSetup*" OR module="Partner Management") AND (status="200" OR status="302") AND src_ip NOT IN [trusted_ips]

🔗 References

📤 Share & Export