7.5
CVSSv3

CVE-2021-2400

Published: 21/07/2021 Updated: 23/07/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

This vulnerability allows remote malicious users to disclose sensitive information on affected installations of Oracle Business Intelligence. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SAXParser endpoint, which listens on TCP port 9502 by default. Due to the improper restriction of XML External Entity (XXE) references, a crafted document specifying a URI causes the XML parser to access the URI and embed the contents back into the XML document for further processing. An attacker can leverage this vulnerability to disclose information in the context of the service account.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

oracle bi publisher 5.5.0.0.0

oracle bi publisher 11.1.1.9.0

oracle bi publisher 12.2.1.3.0

oracle bi publisher 12.2.1.4.0