CVE-2021-35536

8.1 HIGH

📋 TL;DR

This vulnerability in Oracle Deal Management allows authenticated attackers with low privileges to perform unauthorized data manipulation and access sensitive information via HTTP requests. It affects Oracle E-Business Suite versions 12.1.1 through 12.1.3. Attackers can create, delete, or modify critical data and access confidential information.

💻 Affected Systems

Products:
  • Oracle E-Business Suite - Deal Management
Versions: 12.1.1 through 12.1.3
Operating Systems: Any OS running Oracle E-Business Suite
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Oracle Deal Management component specifically; requires network access via HTTP and low privileged user account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Oracle Deal Management data including unauthorized access to all sensitive information and ability to manipulate critical business data, potentially leading to data integrity loss, financial fraud, or business disruption.

🟠

Likely Case

Unauthorized data access and manipulation by authenticated users with low privileges, potentially leading to data breaches, unauthorized transactions, or data corruption within the Deal Management module.

🟢

If Mitigated

Limited impact due to network segmentation, strong access controls, and monitoring, with potential detection of unauthorized access attempts before significant damage occurs.

🌐 Internet-Facing: HIGH - The vulnerability is network accessible via HTTP and requires only low privileges, making internet-facing instances particularly vulnerable to exploitation.
🏢 Internal Only: HIGH - Even internally, low-privileged authenticated users can exploit this vulnerability to access and manipulate critical business data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Oracle describes it as 'easily exploitable' requiring only low privileged network access via HTTP. No public exploit code is known as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Oracle Critical Patch Update October 2021 or later

Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2021.html

Restart Required: Yes

Instructions:

1. Download the October 2021 Critical Patch Update from Oracle Support. 2. Apply the patch to affected Oracle E-Business Suite instances. 3. Restart the application services. 4. Test functionality after patching.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Oracle Deal Management to only trusted IP addresses and networks

Privilege Reduction

all

Review and minimize low-privileged user accounts with access to Deal Management

🧯 If You Can't Patch

  • Implement strict network access controls to limit HTTP access to Oracle Deal Management
  • Enhance monitoring and logging for unauthorized data access or modification attempts

🔍 How to Verify

Check if Vulnerable:

Check Oracle E-Business Suite version and verify if Deal Management component is installed and running versions 12.1.1-12.1.3

Check Version:

Check Oracle E-Business Suite version through application administration interface or database queries specific to your deployment

Verify Fix Applied:

Verify that October 2021 Critical Patch Update has been applied and test that unauthorized data access/manipulation is no longer possible

📡 Detection & Monitoring

Log Indicators:

  • Unusual data access patterns in Deal Management logs
  • Multiple failed authorization attempts followed by successful data access
  • Unexpected data creation, modification, or deletion events

Network Indicators:

  • Unusual HTTP traffic patterns to Deal Management endpoints
  • Requests from unexpected IP addresses or user accounts

SIEM Query:

Search for: (source="oracle-ebs" AND (event_type="data_access" OR event_type="data_modification") AND user_privilege="low") OR (http_request_to="/deal_management/*" AND status_code=200 AND user="low_privilege_account")

🔗 References

📤 Share & Export