CVE-2021-35662
📋 TL;DR
This vulnerability in Oracle Outside In Technology allows unauthenticated attackers to cause denial of service by crashing or hanging the software. It affects systems using Oracle Fusion Middleware with Outside In Filters version 8.5.5. The vulnerability is network-accessible via HTTP and requires no user interaction.
💻 Affected Systems
- Oracle Fusion Middleware with Outside In Filters
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete denial of service for any application using Outside In Technology, potentially affecting multiple business processes that rely on document processing capabilities.
Likely Case
Service disruption for applications using Outside In Technology for document conversion or processing, leading to temporary unavailability of affected services.
If Mitigated
Limited impact if network access is restricted or if input validation prevents malicious payloads from reaching the vulnerable component.
🎯 Exploit Status
Oracle describes this as 'easily exploitable' with no authentication required. The attack vector is HTTP, making it straightforward for attackers to target exposed services.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Oracle Critical Patch Update for October 2021 or later
Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2021.html
Restart Required: Yes
Instructions:
1. Review Oracle Critical Patch Update Advisory for October 2021. 2. Apply the appropriate patch for your Oracle Fusion Middleware installation. 3. Restart affected services. 4. Test document processing functionality.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to services using Outside In Technology to trusted sources only
Input Validation
allImplement strict input validation and sanitization before passing data to Outside In Technology components
🧯 If You Can't Patch
- Implement network controls to restrict access to affected services
- Monitor for abnormal service behavior and implement rate limiting
🔍 How to Verify
Check if Vulnerable:
Check Oracle Fusion Middleware version and verify if Outside In Technology 8.5.5 is installed and exposed via HTTP
Check Version:
Consult Oracle documentation for version checking commands specific to your installation
Verify Fix Applied:
Verify patch installation through Oracle patch management tools and confirm version is updated beyond 8.5.5
📡 Detection & Monitoring
Log Indicators:
- Multiple service crashes or hangs
- Abnormal termination of Outside In processes
- Increased error rates in document processing
Network Indicators:
- HTTP requests to Outside In endpoints with malformed document data
- Unusual traffic patterns to document processing services
SIEM Query:
Search for: (process_name:"OutsideIn" OR service_name:"OutsideIn") AND (event_type:crash OR status:failed)