CVE-2022-21273

8.1 HIGH

📋 TL;DR

This vulnerability in Oracle Project Costing allows authenticated attackers with low privileges to manipulate critical data via HTTP requests. Attackers can create, delete, or modify sensitive project costing data, potentially compromising financial integrity. Affected systems include Oracle E-Business Suite versions 12.2.3 through 12.2.11.

💻 Affected Systems

Products:
  • Oracle E-Business Suite - Project Costing
Versions: 12.2.3-12.2.11
Operating Systems: All platforms running Oracle E-Business Suite
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Oracle Project Costing component with Expenses and Currency Override functionality enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Oracle Project Costing data including unauthorized access to all financial records, manipulation of costing data, and potential financial fraud or data destruction.

🟠

Likely Case

Unauthorized modification of project expenses, currency overrides, and financial data leading to inaccurate costing, financial reporting issues, and potential compliance violations.

🟢

If Mitigated

Limited impact with proper access controls, network segmentation, and monitoring in place, though the vulnerability still exists at the application level.

🌐 Internet-Facing: HIGH - HTTP accessible vulnerability that can be exploited remotely by authenticated users, making internet-facing instances particularly vulnerable.
🏢 Internal Only: HIGH - Even internally, low-privileged users can exploit this to manipulate critical financial data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Oracle describes as 'easily exploitable' with low privileges required. No public exploit code identified as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Oracle Critical Patch Update for January 2022 or later

Vendor Advisory: https://www.oracle.com/security-alerts/cpujan2022.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Oracle Support. 2. Apply the patch following Oracle's E-Business Suite patching procedures. 3. Restart affected services. 4. Test functionality in a non-production environment first.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Oracle E-Business Suite to only trusted IP addresses and networks

Use firewall rules to limit access to Oracle E-Business Suite HTTP ports

Privilege Reduction

all

Review and minimize user privileges in Oracle Project Costing module

Review user roles and permissions in Oracle E-Business Suite

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to Oracle E-Business Suite
  • Enhance monitoring and logging of Oracle Project Costing module activities and review for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check Oracle E-Business Suite version and installed patches against Oracle's January 2022 Critical Patch Update advisory

Check Version:

Check Oracle E-Business Suite version through application administration tools or database queries specific to your implementation

Verify Fix Applied:

Verify patch application through Oracle's patch management tools and confirm version is beyond affected range

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns of data modification in Project Costing module
  • Multiple failed authentication attempts followed by successful low-privilege access
  • Unexpected expense or currency override transactions

Network Indicators:

  • HTTP requests to Project Costing endpoints from unusual sources
  • Patterns of data manipulation requests

SIEM Query:

Search for: (source="oracle-ebs" AND (module="Project Costing" OR component="Expenses") AND (action="modify" OR action="delete" OR action="create") AND user_privilege="low")

🔗 References

📤 Share & Export