CVE-2024-21077

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers with network access via HTTP to compromise Oracle Trade Management, potentially gaining unauthorized access to sensitive data. It affects Oracle E-Business Suite versions 12.2.3 through 12.2.13. The vulnerability is in the GL Accounts LOV component and has a CVSS score of 7.5.

💻 Affected Systems

Products:
  • Oracle E-Business Suite - Trade Management
Versions: 12.2.3 through 12.2.13
Operating Systems: All platforms running Oracle E-Business Suite
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the GL Accounts LOV component specifically. All deployments within the version range are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all Oracle Trade Management accessible data, including sensitive financial and trade information.

🟠

Likely Case

Unauthorized access to critical business data such as financial records, trade details, and customer information.

🟢

If Mitigated

Limited or no data exposure if proper network segmentation and access controls are implemented.

🌐 Internet-Facing: HIGH - Unauthenticated network access via HTTP makes internet-facing instances extremely vulnerable.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable to insider threats or compromised internal hosts.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Oracle describes it as 'easily exploitable' and requires no authentication. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle Critical Patch Update April 2024

Vendor Advisory: https://www.oracle.com/security-alerts/cpuapr2024.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Oracle Support. 2. Apply the patch following Oracle's patching procedures. 3. Restart affected services. 4. Test functionality after patching.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Oracle Trade Management to only trusted sources

Web Application Firewall

all

Implement WAF rules to block suspicious requests to the GL Accounts LOV component

🧯 If You Can't Patch

  • Isolate the Oracle Trade Management system from untrusted networks
  • Implement strict access controls and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check Oracle E-Business Suite version and verify if it's between 12.2.3 and 12.2.13

Check Version:

Check Oracle application version through Oracle application administration tools or database queries specific to your deployment

Verify Fix Applied:

Verify patch installation from Oracle Critical Patch Update April 2024 and confirm version is no longer in vulnerable range

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to GL Accounts LOV component
  • Unauthenticated requests to sensitive endpoints

Network Indicators:

  • HTTP requests to Trade Management endpoints from unexpected sources
  • Burst of data extraction patterns

SIEM Query:

source="oracle-ebs" AND (uri="*GLAccountsLOV*" OR component="Trade Management") AND status=200 AND user="anonymous"

🔗 References

📤 Share & Export