Sploit.io - Search

Product: E-Business Suite Technology Stack, version: >= 12.2.3, <= 12.2.12

CVE-2023-22004

Severity: MEDIUM

Description: Vulnerability in the Oracle Applications Technology product of Oracle E-Business Suite (component: Reports Configuration). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Technology. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Technology accessible data. CVSS 3.1 Base Score 4.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N).

CVSS Score: 4.3

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.002100000
  • Percentile: 0.435600000
  • Date: 2026-04-20

ExploitDB

No data available.

HackerOne Data

  • Rank: 9122
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Oracle Corporation E-Business Suite Technology Stack - Versions: 12.2.3

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, CVE-2023-22004, resides within the Oracle Applications Technology component of Oracle E-Business Suite, specifically in the Reports Configuration. It’s an easily exploitable vulnerability allowing an unauthenticated attacker, with network access via HTTP, to compromise the system. While requiring human interaction, the impact centers around unauthorized modification, insertion, or deletion of data accessible by Oracle Applications Technology. The CVSS base score of 4.3 (Medium) indicates a moderate risk. The likelihood of exploitation is relatively high given the ease of exploitation and network accessibility, though it hinges on successful social engineering to get a user to interact with the malicious component. The primary impact is to data integrity, with potential for data corruption or loss. Confidentiality and availability are less directly impacted, although compromised data integrity could indirectly affect both. The EPSS score of 0.002100000 suggests a relatively low but non-zero probability of exploitation in the wild.

    2. Potential Attack Scenarios
    A potential attack scenario involves a user receiving a seemingly legitimate report generated by Oracle Applications Technology via HTTP. The report, however, contains a malicious element embedded within its configuration. When the user opens the report, the malicious element triggers the vulnerability, allowing the attacker to insert, update, or delete data within the Oracle Applications Technology system. This could manifest as altered financial records, modified inventory data, or corrupted customer information. The attacker leverages the user’s trust and interaction to gain unauthorized access to manipulate the underlying data. The attack vector is HTTP, making it easily accessible over the network, and the attacker doesn’t need prior authentication. The outcome is compromised data integrity, potentially leading to incorrect business decisions or operational disruptions.

    3. Mitigation Recommendations
    The primary mitigation recommendation is to apply the latest Oracle Critical Patch Update (CPU) for July 2023, specifically addressing this vulnerability. Oracle provides detailed instructions for applying the patch on their website: https://www.oracle.com/security-alerts/cpujul2023.html. Additionally, organizations should implement strong input validation for report configurations to limit the potential for malicious elements. User awareness training is crucial to educate users about potential risks when opening reports, encouraging them to be cautious and verify the source if necessary. Regularly review report configurations and access controls to minimize the impact of a successful exploit. Consider implementing web application firewall (WAF) rules to filter malicious HTTP requests targeting the Reports Configuration component.

    4. Executive Summary
    CVE-2023-22004 is a medium-risk vulnerability affecting Oracle E-Business Suite that could allow attackers to modify data within our Oracle Applications Technology system. While an attacker needs a user to interact with a malicious report, the vulnerability is easily exploitable over the network. Successful attacks could lead to compromised data integrity, potentially impacting financial reporting, inventory management, or customer data. We should prioritize applying the July 2023 Oracle Critical Patch Update to address this vulnerability, along with user awareness training and review of report configurations. Addressing this vulnerability is vital to maintain the accuracy and reliability of our Oracle Applications Technology data and ensure sound business operations. Prompt action will minimize the risk of data corruption and potential business disruptions.