===========================================================================
                         AUSCERT Security Bulletin                         
                                                                           
                               ASB-2024.0089                               
              Oracle Enterprise Manager Critical Patch Update              
                               17 April 2024                               
                                                                           
===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Oracle Application Testing Suite                        
                   Oracle Enterprise Manager Base Platform                 
                   Oracle Enterprise Manager for Fusion Middleware         
Operating System:  Windows                                                 
                   UNIX variants (UNIX, Linux, OSX)                        
Resolution:        Patch/Upgrade                                           
CVE Names:         CVE-2023-44487 CVE-2023-48795 CVE-2023-1370             
                   CVE-2021-36770 CVE-2022-46337 CVE-2023-42503            
                   CVE-2022-42920 CVE-2023-20861 CVE-2024-21067            
                   CVE-2022-34381                                          

Comment: CVSS (Max):  9.8 CVE-2022-42920 (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: NIST, [Oracle]                                       
         Calculator:  https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H



OVERVIEW

        Multiple vulnerabilities have been identified in :
         o Oracle Application Testing Suite, version 13.3.0.1
         o Oracle Enterprise Manager Base Platform, version 13.5.0.0
         o Oracle Enterprise Manager for Fusion Middleware, version
           13.5.0.0
        [1]


IMPACT

        The vendor has provided the following information regarding the
        vulnerabilities:

        "This Critical Patch Update contains 11 new security patches for
        Oracle Enterprise Manager. 7 of these vulnerabilities may be
        remotely
        exploitable without authentication, i.e., may be exploited over a
        network without requiring user credentials. None of these patches
        are
        applicable to client-only installations, i.e., installations that
        do
        not have Oracle Enterprise Manager installed." [1]

        "CVE-2022-42920
         9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
        The supported version that is affected is 13.3.0.1. Easily
        exploitable vulnerability allows unauthenticated attacker with
        network access via HTTP to compromise Oracle Application Testing
        Suite. Successful attacks of this vulnerability can result in
        takeover of Oracle Application Testing Suite.
         Affects:
         o Oracle Application Testing Suite 13.3.0.1
         o Oracle Enterprise Manager for Fusion Middleware 13.5.0.0

        CVE-2022-46337
         9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
        The supported version that is affected is 13.3.0.1. Easily
        exploitable vulnerability allows unauthenticated attacker with
        network access via HTTP to compromise Oracle Application Testing
        Suite. Successful attacks of this vulnerability can result in
        takeover of Oracle Application Testing Suite.
         Affects:
         o Oracle Application Testing Suite 13.3.0.1

        CVE-2022-34381
         9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
        The supported version that is affected is 13.3.0.1. Easily
        exploitable vulnerability allows unauthenticated attacker with
        network access via HTTP to compromise Oracle Application Testing
        Suite. Successful attacks of this vulnerability can result in
        takeover of Oracle Application Testing Suite.
         Affects:
         o Oracle Application Testing Suite 13.3.0.1

        CVE-2024-21067
         8.8 AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
        The supported version that is affected is 13.5.0.0. Easily
        exploitable vulnerability allows low privileged attacker with logon
        to the infrastructure where Oracle Enterprise Manager Base Platform
        executes to compromise Oracle Enterprise Manager Base Platform.
        While
        the vulnerability is in Oracle Enterprise Manager Base Platform,
        attacks may significantly impact additional products (scope
        change).
        Successful attacks of this vulnerability can result in takeover of
        Oracle Enterprise Manager Base Platform.
         Affects:
         o Oracle Enterprise Manager Base Platform 13.5.0.0

        CVE-2021-36770
         7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
        The supported version that is affected is 13.5.0.0. Easily
        exploitable vulnerability allows unauthenticated attacker with
        logon
        to the infrastructure where Oracle Enterprise Manager for Fusion
        Middleware executes to compromise Oracle Enterprise Manager for
        Fusion Middleware. Successful attacks require human interaction
        from
        a person other than the attacker. Successful attacks of this
        vulnerability can result in takeover of Oracle Enterprise Manager
        for
        Fusion Middleware.
         Affects:
         o Oracle Enterprise Manager for Fusion Middleware 13.5.0.0

        CVE-2023-1370
         7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
        The supported version that is affected is 13.3.0.1. Easily
        exploitable vulnerability allows unauthenticated attacker with
        network access via HTTP to compromise Oracle Application Testing
        Suite. Successful attacks of this vulnerability can result in
        unauthorized ability to cause a hang or frequently repeatable crash
        (complete DOS) of Oracle Application Testing Suite.
         Affects:
         o Oracle Application Testing Suite 13.3.0.1

        CVE-2023-44487
         7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
        The supported version that is affected is 13.5.0.0. Easily
        exploitable vulnerability allows unauthenticated attacker with
        network access via HTTP to compromise Oracle Enterprise Manager
        Base
        Platform. Successful attacks of this vulnerability can result in
        unauthorized ability to cause a hang or frequently repeatable crash
        (complete DOS) of Oracle Enterprise Manager Base Platform.
         Affects:
         o Oracle Enterprise Manager Base Platform 13.5.0.0

        CVE-2023-20861
         6.5 AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
        The supported version that is affected is 13.5.0.0. Easily
        exploitable vulnerability allows low privileged attacker with
        network
        access via HTTP to compromise Oracle Enterprise Manager for Fusion
        Middleware. Successful attacks of this vulnerability can result in
        unauthorized ability to cause a hang or frequently repeatable crash
        (complete DOS) of Oracle Enterprise Manager for Fusion Middleware.
         Affects:
         o Oracle Enterprise Manager for Fusion Middleware 13.5.0.0

        CVE-2023-48795
         5.9 AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
        The supported version that is affected is 13.5.0.0. Difficult to
        exploit vulnerability allows unauthenticated attacker with network
        access via SSH to compromise Oracle Enterprise Manager Base
        Platform.
        Successful attacks of this vulnerability can result in unauthorized
        creation, deletion or modification access to critical data or all
        Oracle Enterprise Manager Base Platform accessible data.
         Affects:
         o Oracle Enterprise Manager Base Platform 13.5.0.0

        CVE-2023-42503
         5.5 AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
        The supported version that is affected is 13.5.0.0. Easily
        exploitable vulnerability allows unauthenticated attacker with
        logon
        to the infrastructure where Oracle Enterprise Manager Base Platform
        executes to compromise Oracle Enterprise Manager Base Platform.
        Successful attacks require human interaction from a person other
        than
        the attacker. Successful attacks of this vulnerability can result
        in
        unauthorized ability to cause a hang or frequently repeatable crash
        (complete DOS) of Oracle Enterprise Manager Base Platform.
         Affects:
         o Oracle Enterprise Manager Base Platform 13.5.0.0" [2]



MITIGATION

        Oracle states:

        "Due to the threat posed by a successful attack, Oracle strongly
        recommends that customers apply CPU fixes as soon as possible.
        Until
        you apply the CPU fixes, it may be possible to reduce the risk of
        successful attack by blocking network protocols required by an
        attack. For attacks that require certain privileges or access to
        certain packages, removing the privileges or the ability to access
        the packages from users that do not need the privileges may help
        reduce the risk of successful attack. Both approaches may break
        application functionality, so Oracle strongly recommends that
        customers test changes on non-production systems. Neither approach
        should be considered a long-term solution as neither corrects the
        underlying problem." [1]


REFERENCES

        [1] Oracle Critical Patch Update Advisory - April 2024
            https://www.oracle.com/security-alerts/cpuapr2024.html

        [2] Text Form of Oracle Critical Patch Update - April 2024 Risk
            Matrices
            https://www.oracle.com/security-alerts/cpuapr2024verbose.html




AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================