CVE-2024-21254

8.8 HIGH

📋 TL;DR

This vulnerability in Oracle BI Publisher allows authenticated attackers with low privileges to gain complete control over the system via HTTP requests. It affects Oracle Analytics versions 7.0.0.0.0, 7.6.0.0.0, and 12.2.1.4.0. Successful exploitation leads to full compromise of confidentiality, integrity, and availability.

💻 Affected Systems

Products:
  • Oracle BI Publisher
Versions: 7.0.0.0.0, 7.6.0.0.0, 12.2.1.4.0
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Oracle Analytics component Web Server. Requires network access via HTTP and low privileged account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover allowing data theft, data manipulation, service disruption, and potential lateral movement to connected systems.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive business intelligence data and reports.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent low-privileged users from reaching vulnerable endpoints.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Oracle describes as 'easily exploitable' with low privileges required. No public exploit details available as of advisory.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply patches from Oracle Critical Patch Update October 2024

Vendor Advisory: https://www.oracle.com/security-alerts/cpuoct2024.html

Restart Required: Yes

Instructions:

1. Download appropriate patches from Oracle Support. 2. Apply patches following Oracle BI Publisher patching procedures. 3. Restart affected services. 4. Verify patch application.

🔧 Temporary Workarounds

Network Access Restriction

all

Restrict network access to Oracle BI Publisher to only trusted IP addresses and networks.

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport <port> -s <trusted_ip> -j ACCEPT
iptables -A INPUT -p tcp --dport <port> -j DROP

Privilege Reduction

all

Review and minimize low-privileged user accounts with HTTP access to BI Publisher.

Review user accounts in Oracle BI Publisher administration console
Remove unnecessary accounts or elevate authentication requirements

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate BI Publisher from untrusted networks
  • Enforce multi-factor authentication and review all user privileges regularly

🔍 How to Verify

Check if Vulnerable:

Check Oracle BI Publisher version via administration console or query system version through supported interfaces.

Check Version:

Check Oracle documentation for version query commands specific to your deployment.

Verify Fix Applied:

Verify patch application through Oracle BI Publisher version check and confirm with Oracle patch verification procedures.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns from low-privileged accounts
  • Unexpected administrative actions from non-admin users
  • Multiple failed privilege escalation attempts

Network Indicators:

  • Unusual HTTP traffic patterns to BI Publisher web endpoints
  • Traffic from unexpected sources to administrative interfaces

SIEM Query:

source="oracle_bi_publisher" AND (event_type="privilege_escalation" OR user_privilege="low" AND action="admin")

🔗 References

📤 Share & Export