Sploit.io - Search

Product: E-Business Suite Technology Stack, version: 12.2.7

CVE-2017-10066

Severity: Unknown

Description: Vulnerability in the Oracle Applications Technology Stack component of Oracle E-Business Suite (subcomponent: Oracle Forms). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Technology Stack. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Technology Stack accessible data. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.014560000
  • Percentile: 0.806300000
  • Date: 2026-03-03

ExploitDB

No data available.

HackerOne Data

  • Rank: 8833
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Oracle Corporation E-Business Suite Technology Stack - Versions: 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, CVE-2017-10066, resides within the Oracle Forms component of the Oracle E-Business Suite Technology Stack. It is an easily exploitable vulnerability allowing an unauthenticated attacker with network access via HTTP to compromise the Oracle Applications Technology Stack. The core risk lies in the potential for unauthorized modification, insertion, or deletion of data within the Oracle Applications Technology Stack. Given the widespread use of Oracle E-Business Suite in many organizations, the business impact can be significant, potentially affecting critical business processes dependent on the data stored within the affected systems. The likelihood of exploitation is moderate to high, due to the ease of exploit and lack of authentication requirements. The impact primarily affects data integrity, though depending on the data compromised, confidentiality could also be impacted. Availability is less directly affected, but significant data manipulation could lead to performance degradation or service disruption. The CVSS 3.0 base score of 5.3 (Integrity impact) indicates a moderate risk.

    2. Potential Attack Scenarios
    An attacker could leverage this vulnerability by sending a crafted HTTP request to the affected Oracle Forms instance. The request, designed to bypass authentication, could directly manipulate data within the Oracle Applications Technology Stack. For example, an attacker could modify financial records, alter inventory levels, or change customer information. The attack vector is network-based, meaning the attacker needs network access to the affected system. The attack process involves identifying a vulnerable instance, crafting the malicious HTTP request, and sending it to the target system. Successful exploitation could lead to inaccurate reporting, incorrect billing, or disruptions in supply chain management, depending on the data altered. This could result in financial losses, reputational damage, or operational inefficiencies.

    3. Mitigation Recommendations
    The primary mitigation for CVE-2017-10066 is to apply the appropriate patch provided by Oracle. Organizations using affected versions (12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, or 12.2.7) should prioritize patching according to their change management processes. The Oracle Security Advisory for October 2017 (http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html) provides detailed patching instructions for each affected version. In addition to patching, consider implementing network segmentation to limit exposure to the vulnerable system. Web Application Firewalls (WAFs) can be configured to filter malicious HTTP requests. Regularly monitor application logs for suspicious activity, looking for unusual data modifications or access patterns. Finally, ensure proper input validation is being performed within the Oracle Forms application to help prevent future vulnerabilities.

    4. Executive Summary
    CVE-2017-10066 is a vulnerability in Oracle E-Business Suite that allows attackers to modify data without authentication. This impacts the integrity of data used by your organization, potentially leading to inaccurate reporting, incorrect billing, or operational disruptions. The vulnerability is relatively easy to exploit, making it a moderate to high risk. To address this, we recommend promptly patching your affected Oracle E-Business Suite instances to the latest version as outlined in the Oracle Security Advisory (http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html). Patching is the most effective way to protect your data and ensure the continued smooth operation of your business processes. Failure to address this vulnerability could lead to significant financial and reputational impacts.

    CVE-2017-10324

    Severity: Unknown

    Description: Vulnerability in the Oracle Applications Technology Stack component of Oracle E-Business Suite (subcomponent: Oracle Forms). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Technology Stack. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Applications Technology Stack accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).

    CVSS Score: N/A

    Priority

    D

    CISA Data

    EPSS Data

    • EPSS: 0.004160000
    • Percentile: 0.613830000
    • Date: 2026-03-03

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 8833
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • Oracle Corporation E-Business Suite Technology Stack - Versions: 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability, CVE-2017-10324, resides within the Oracle Applications Technology Stack, specifically the Oracle Forms component, affecting versions 12.1.3, 12.2.3 through 12.2.7 of Oracle E-Business Suite. The vulnerability is categorized as easily exploitable, meaning an unauthenticated attacker with network access via HTTP can compromise the system. The primary risk is unauthorized read access to a subset of the data accessible by the Oracle Applications Technology Stack. While the impact is currently limited to confidentiality, a successful exploit could reveal sensitive business data. The likelihood of exploitation is moderate to high, given the ease of exploitation and the wide prevalence of Oracle E-Business Suite deployments. The CVSS 3.0 score of 5.3 (Confidentiality: Low) indicates a moderate risk, but the ease of exploitation elevates the overall concern. Integrity and availability are currently unaffected, but potential future exploits could leverage the read access to modify data or disrupt service. The EPSS score of 0.004160000 suggests a relatively low, but not insignificant, probability of exploitation in the wild.

      2. Potential Attack Scenarios
      An attacker, residing on the same network or remotely accessible via HTTP, could exploit this vulnerability by sending a crafted HTTP request to the vulnerable Oracle Forms component. The attacker doesn’t require authentication, making the attack relatively simple to execute. The crafted request could leverage a specific parameter or function within Oracle Forms to gain read access to data. For example, an attacker might be able to query internal tables or access configuration files, potentially revealing user credentials, business process data, or financial information. The attacker could then leverage this stolen data for further reconnaissance, privilege escalation, or lateral movement within the network. A practical scenario would be an attacker exploiting the vulnerability to discover employee salary information stored within the E-Business Suite, potentially leading to insider trading or competitive disadvantage.

      3. Mitigation Recommendations
      The primary mitigation for CVE-2017-10324 is to apply the latest patch released by Oracle as part of the October 2017 Critical Patch Update (CPU). Refer to Oracle Advisory CPUOCT2017-3236626 for detailed patching instructions specific to your Oracle E-Business Suite version: http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html. In addition, review network configurations to ensure that access to the Oracle Applications Technology Stack is restricted to necessary hosts and users. Implement web application firewall (WAF) rules to filter malicious HTTP requests targeting the Oracle Forms component. Regularly monitor system logs for suspicious activity, looking for unusual data access patterns. Consider implementing strong authentication mechanisms where feasible, even though this vulnerability doesn’t require it, to add an extra layer of defense.

      4. Executive Summary
      CVE-2017-10324 is an easily exploitable vulnerability in the Oracle E-Business Suite that allows an unauthenticated attacker to read sensitive data. The vulnerability impacts a wide range of commonly used Oracle E-Business Suite versions, making it a significant concern for organizations relying on this platform. Successful exploitation could result in the compromise of confidential business data, potentially impacting competitive advantage or leading to financial loss. We recommend promptly applying the October 2017 CPU patch to mitigate this risk. While the current impact is limited to confidentiality, failing to address this vulnerability could open the door to further attacks. Prioritizing this patch deployment is crucial to maintain the security and integrity of your Oracle E-Business Suite deployment and the data it contains.