Oracle PeopleSoft Products Multiple Flaws Let Remote Users Access and Modify Data and Deny Service on the Target System
|
SecurityTracker Alert ID: 1038301 |
SecurityTracker URL: http://securitytracker.com/id/1038301
|
CVE Reference:
CVE-2017-3502, CVE-2017-3519, CVE-2017-3520, CVE-2017-3521, CVE-2017-3522, CVE-2017-3524, CVE-2017-3525, CVE-2017-3527, CVE-2017-3536, CVE-2017-3546, CVE-2017-3547, CVE-2017-3548, CVE-2017-3570, CVE-2017-3571, CVE-2017-3577
(Links to External Site)
|
Date: Apr 19 2017
|
Impact:
Denial of service via network, Disclosure of system information, Disclosure of user information, Modification of system information, Modification of user information
|
Fix Available: Yes Vendor Confirmed: Yes
|
Version(s): 8.54, 8.55, 9.1, 9.2
|
Description:
Multiple vulnerabilities were reported in Oracle PeopleSoft Products. A remote user can access and modify data on the target system. A remote user can cause denial of service conditions on the target system.
A remote user can exploit a flaw in the PeopleSoft Enterprise PeopleTools Security component to access data [CVE-2017-3519].
A remote user can exploit a flaw in the PeopleSoft Enterprise PeopleTools MultiChannel Framework component to modify data [CVE-2017-3547].
A remote authenticated user can exploit a flaw in the PeopleSoft Enterprise CS Campus Community Frameworks component to access and modify data [CVE-2017-3577].
A remote authenticated user can exploit a flaw in the PeopleSoft Enterprise FSCM eSettlements component to access and modify data [CVE-2017-3570].
A remote user can exploit a flaw in the PeopleSoft Enterprise PeopleTools Fluid Core component to modify data [CVE-2017-3520].
A remote user can exploit a flaw in the PeopleSoft Enterprise PeopleTools Integration Broker component to partially access data and cause partial denial of service conditions [CVE-2017-3548].
A remote user can exploit a flaw in the PeopleSoft Enterprise PeopleTools MultiChannel Framework component to partially access and partially modify data [CVE-2017-3546].
A remote authenticated user can exploit a flaw in the PeopleSoft Enterprise SCM Purchasing Supplier Registration component to access and modify data [CVE-2017-3521].
A remote authenticated user can exploit a flaw in the PeopleSoft Enterprise SCM Service Procurement Usability component to access and modify data [CVE-2017-3525].
A remote authenticated user can exploit a flaw in the PeopleSoft Enterprise SCM Strategic Sourcing Bidder Registration component to access and modify data [CVE-2017-3524].
A remote authenticated user can exploit a flaw in the PeopleSoft Enterprise SCM eBill Payment Security component to access and modify data [CVE-2017-3571].
A remote authenticated user can exploit a flaw in the PeopleSoft Enterprise SCM eSupplier Connection Vendor component to access and modify data [CVE-2017-3522].
A remote user can exploit a flaw in the PeopleSoft Enterprise FIN Receivables Receivables component to partially modify data [CVE-2017-3502].
A remote user can exploit a flaw in the PeopleSoft Enterprise PeopleTools Fluid Core component to partially access data [CVE-2017-3527].
A remote authenticated user can exploit a flaw in the PeopleSoft Enterprise PeopleTools Security component to partially access and partially modify data [CVE-2017-3536].
Tawatchai Pinsuwan of Mindterra Red Team, Roman Shalymov of ERPScan, Dmitrii Iudin aka @ret5et, and Nadezhda Krivdyuk of ERPScan reported these vulnerabilities.
|
Impact:
A remote user can obtain data on the target system.
A remote user can modify data on the target system.
A remote user can cause denial of service conditions.
|
Solution:
The vendor has issued a fix as part of the April 2017 Oracle Critical Patch Update.
The vendor advisory is available at:
http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html
|
Vendor URL: www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html (Links to External Site)
|
Cause:
Not specified
|
Underlying OS: Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), UNIX (Tru64), Windows (Any)
|
|
Message History:
None.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|