SB2020071665 - Multiple vulnerabilities in Oracle FLEXCUBE Investor Servicing



SB2020071665 - Multiple vulnerabilities in Oracle FLEXCUBE Investor Servicing

Published: July 16, 2020

Security Bulletin ID SB2020071665
Severity
High
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 20% Medium 40% Low 40%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Improper Certificate Validation (CVE-ID: CVE-2020-9488)

The vulnerability allows a remote attacker to perform man-in-the-middle attack.

The vulnerability exists due to the Apache Log4j SMTP appender does not validate SSL certificates. A remote attacker can perform a MitM attack, intercept and decrypt network traffic.


2) Resource management error (CVE-ID: CVE-2019-12402)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to the file name encoding algorithm can get into an infinite loop when faced with specially crafted inputs. A remote attacker can choose the file names inside of an archive created by Compress and cause a denial of service condition on the target system.


3) Improper input validation (CVE-ID: CVE-2020-14569)

The vulnerability allows a remote authenticated user to read and manipulate data.

The vulnerability exists due to improper input validation within the Infrastructure component in Oracle FLEXCUBE Investor Servicing. A remote authenticated user can exploit this vulnerability to read and manipulate data.


4) Incorrect default permissions (CVE-ID: CVE-2020-1945)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to Apache Ant is using a default temporary directory identified by the Java system property java.io.tmpdir for several tasks and may thus leak sensitive information. The fixcrlf and replaceregexp tasks also copy files from the temporary directory back into the build tree allowing an attacker to inject modified source files into the build process. A local user with access to the system can view contents of files and directories or modify them.


5) XML External Entity injection (CVE-ID: CVE-2019-13990)

The vulnerability allows a remote attacker to conduct an XML External Entity (XXE) attack on a targeted system.

The vulnerability exists due to insufficient validation of user-supplied XML input in the "initDocumentParser" function in the "xml/XMLSchedulingDataProcessor.java" file. A remote authenticated attacker can submit a malicious job description to the targeted system and conduct an XXE attack.



Remediation

Install update from vendor's website.