Lucene search

K
nessusThis script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.ORACLE_WEBCENTER_PORTAL_CPU_APR_2020.NBIN
HistoryApr 21, 2020 - 12:00 a.m.

Oracle WebCenter Portal Multiple Vulnerabilities (Apr 2020 CPU)

2020-04-2100:00:00
This script is Copyright (C) 2020-2024 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
8

The version of Oracle WebCenter Portal installed on the remote host is missing a security patch from the April 2020 Critical Patch Update (CPU). It is, therefore, affected by the following vulnerabilities :

  • A polymorphic typing exists in the jackson-databind component of the security framework of Oracle WebCenter Portal. An unauthenticated, remote attacker can exploit this, via an externally exposed RMI endpoint, to make the service execute a malicious payload. (CVE-2019-16943)

  • A memory allocation issue exists in the Bouncy Castle Crypto library component of the security framework of Oracle WebCenter Portal. An unauthenticated, remote attacker can exploit this, via crafted ASN.1 data, to cause a partial denial of service condition. (CVE-2019-17359)

Note that Nessus has not attempted to exploit these issues but has instead relied only on the application’s self-reported version number.

Binary data oracle_webcenter_portal_cpu_apr_2020.nbin
VendorProductVersion
oraclefusion_middleware