CVE-2024-21195

7.6 HIGH

📋 TL;DR

This vulnerability in Oracle BI Publisher allows authenticated attackers with low privileges to access, modify, or delete sensitive data, and cause partial service disruption via HTTP requests. It affects Oracle Analytics versions 7.0.0.0.0, 7.6.0.0.0, and 12.2.1.4.0. Attackers can compromise confidentiality, integrity, and availability of BI Publisher data.

💻 Affected Systems

Products:
  • Oracle BI Publisher
  • Oracle Analytics
Versions: 7.0.0.0.0, 7.6.0.0.0, 12.2.1.4.0
Operating Systems: All supported platforms for Oracle BI Publisher
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Layout Templates component. Requires network access via HTTP and low privileged account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all Oracle BI Publisher accessible data including unauthorized access, modification, deletion, and partial denial of service affecting business operations.

🟠

Likely Case

Unauthorized access to critical business intelligence data and potential data manipulation by authenticated low-privilege users.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access controls, and monitoring are implemented.

🌐 Internet-Facing: HIGH - Network accessible via HTTP with low attack complexity makes internet-facing instances prime targets.
🏢 Internal Only: MEDIUM - Internal attackers with low privileges could exploit, but requires initial access to internal network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Oracle describes as 'easily exploitable' with low attack complexity. Requires authenticated access but only low privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle Critical Patch Update October 2024

Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2024.html

Restart Required: Yes

Instructions:

1. Download appropriate patches from Oracle Support. 2. Apply patches according to Oracle documentation. 3. Restart affected services. 4. Test functionality.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to Oracle BI Publisher to only trusted IP addresses and networks

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport <BI_Publisher_Port> -s <trusted_network> -j ACCEPT
iptables -A INPUT -p tcp --dport <BI_Publisher_Port> -j DROP

Privilege Reduction

all

Review and minimize low-privilege user accounts with access to BI Publisher

Review user accounts: SELECT * FROM BI_PUBLISHER_USERS;
Remove unnecessary accounts: DELETE FROM BI_PUBLISHER_USERS WHERE USER_ID = <unneeded_user>;

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to BI Publisher
  • Apply principle of least privilege - review and reduce low-privilege user access to minimum required

🔍 How to Verify

Check if Vulnerable:

Check Oracle BI Publisher version: SELECT * FROM PRODUCT_COMPONENT_VERSION WHERE PRODUCT LIKE '%BI Publisher%';

Check Version:

SELECT VERSION FROM PRODUCT_COMPONENT_VERSION WHERE PRODUCT LIKE '%BI Publisher%';

Verify Fix Applied:

Verify patch application: Check patch status in Oracle Enterprise Manager or run: opatch lsinventory

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to layout templates
  • Multiple failed authentication attempts followed by successful low-privilege access
  • Unexpected data export or modification activities

Network Indicators:

  • Unusual HTTP requests to layout template endpoints from low-privilege user accounts
  • Traffic patterns indicating data exfiltration

SIEM Query:

source="oracle_bi_publisher" AND (event_type="template_access" OR event_type="data_export") AND user_privilege="low" AND result="success"

🔗 References

📤 Share & Export