CVE-2023-21923

8.3 HIGH

📋 TL;DR

This vulnerability in Oracle Health Sciences InForm allows authenticated attackers with low privileges to perform unauthorized data manipulation, access sensitive information, or cause partial denial of service via HTTP. Affected organizations are those running Oracle Health Sciences InForm versions prior to 6.3.1.3 or 7.0.0.1.

💻 Affected Systems

Products:
  • Oracle Health Sciences InForm
Versions: Prior to 6.3.1.3 and Prior to 7.0.0.1
Operating Systems: Not specified - likely multiple
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network access via HTTP and low privileged account. Component affected: Core.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all InForm accessible data including creation, deletion, modification of critical clinical trial data, plus partial service disruption.

🟠

Likely Case

Unauthorized access to sensitive clinical trial data and modification of study information by authenticated low-privilege users.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and minimal user privileges.

🌐 Internet-Facing: HIGH - HTTP-accessible vulnerability with network access vector and low attack complexity.
🏢 Internal Only: HIGH - Low privileged internal users can exploit this vulnerability to access and manipulate critical clinical data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

CVSS indicates easily exploitable with low attack complexity. Requires authenticated access but only low privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.3.1.3 or 7.0.0.1

Vendor Advisory: https://www.oracle.com/security-alerts/cpuapr2023.html

Restart Required: Yes

Instructions:

1. Download patches from Oracle Support. 2. Apply patch 6.3.1.3 for versions <6.3.1.3 or 7.0.0.1 for versions <7.0.0.1. 3. Restart InForm services. 4. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to InForm servers to only authorized users and systems

firewall rules to limit HTTP access to specific IP ranges

Privilege Reduction

all

Review and minimize low-privilege user accounts and permissions

audit user accounts with low privileges
remove unnecessary accounts

🧯 If You Can't Patch

  • Implement strict network access controls and segment InForm servers
  • Enforce principle of least privilege and audit all low-privilege user activities

🔍 How to Verify

Check if Vulnerable:

Check InForm version via administration console or configuration files. Compare against affected versions.

Check Version:

Check InForm administration console or consult Oracle documentation for version check commands specific to your deployment.

Verify Fix Applied:

Verify version is 6.3.1.3 or higher (for 6.x) or 7.0.0.1 or higher (for 7.x) after patch application.

📡 Detection & Monitoring

Log Indicators:

  • Unusual data access patterns by low-privilege users
  • Multiple failed authentication attempts followed by successful low-privilege access
  • Unexpected data modification events

Network Indicators:

  • HTTP requests to InForm endpoints from unexpected sources
  • Unusual data volume transfers

SIEM Query:

source="inform-logs" AND (event_type="data_modification" OR event_type="data_access") AND user_privilege="low" AND result="success"

🔗 References

📤 Share & Export