-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2019.0284
          Multiple vulnerabilities have been identified in Oracle
                    Construction and Engineering Suite
                              16 October 2019

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Oracle Construction and Engineering Suite
Operating System:     UNIX variants (UNIX, Linux, OSX)
                      Windows
Impact/Access:        Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                      Modify Arbitrary Files          -- Remote with User Interaction
                      Denial of Service               -- Remote/Unauthenticated      
                      Access Confidential Data        -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2019-14379 CVE-2019-11358 CVE-2019-3020
                      CVE-2019-2976 CVE-2019-0232 CVE-2019-0227
                      CVE-2019-0211 CVE-2017-12626 CVE-2017-6056
Member content until: Friday, November 15 2019
Reference:            ASB-2019.0221
                      ASB-2019.0220
                      ESB-2019.3836
                      ESB-2019.3809

OVERVIEW

        Multiple vulnerabilities have been identified in :
         o Instantis EnterpriseTrack, versions 17.1, 17.2, 17.3
         o Primavera Gateway, versions 15.2, 16.2, 17.12, 18.8
         o Primavera P6 Enterprise Project Portfolio Management, versions
           15.1.0-15.2.18, 16.1.0-16.2.18, 17.1.0-17.12.14, 18.1.0-18.8.13
         o Primavera Unifier, versions 16.1, 16.2, 17.7-17.12, 18.8 [1]


IMPACT

        The vendor has provided the following information regarding the
        vulnerabilities:
        
        "This Critical Patch Update contains 13 new security patches for
        Oracle Construction and Engineering. 11 of these vulnerabilities may
        be remotely exploitable without authentication, i.e., may be
        exploited over a network without requiring user credentials." [1]
        
        "CVE-2017-6056
          9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
        Easily exploitable vulnerability allows unauthenticated attacker with
        network access via HTTP to compromise Instantis EnterpriseTrack.
        Successful attacks of this vulnerability can result in takeover of
        Instantis EnterpriseTrack.
         Affects:
         o Instantis EnterpriseTrack 17.1, 17.2, 17.3
        [WARNING] Found details of CVE vary depending upon products
        
        CVE-2019-14379
          9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
        Easily exploitable vulnerability allows unauthenticated attacker with
        network access via HTTP to compromise Primavera Gateway. Successful
        attacks of this vulnerability can result in takeover of Primavera
        Gateway.
         Affects:
         o Primavera Gateway 15.2, 16.2, 17.12, 18.8
         o Primavera Unifier 16.1, 16.2, 17.7-17.12, 18.8
        
        CVE-2019-3020
          9.3 AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
        Easily exploitable vulnerability allows unauthenticated attacker with
        network access via HTTP to compromise Primavera P6 Enterprise Project
        Portfolio Management. Successful attacks require human interaction
        from a person other than the attacker and while the vulnerability is
        in Primavera P6 Enterprise Project Portfolio Management, attacks may
        significantly impact additional products. Successful attacks of this
        vulnerability can result in unauthorized creation, deletion or
        modification access to critical data or all Primavera P6 Enterprise
        Project Portfolio Management accessible data as well as unauthorized
        access to critical data or complete access to all Primavera P6
        Enterprise Project Portfolio Management accessible data.
         Affects:
         o Primavera P6 Enterprise Project Portfolio Management
           15.1.0-15.2.18, 16.1.0-16.2.18, 17.1.0-17.12.14, 18.1.0-18.8.11
        
        CVE-2019-0232
          8.1 AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
        Difficult to exploit vulnerability allows unauthenticated attacker
        with network access via HTTP to compromise Instantis EnterpriseTrack.
        Successful attacks of this vulnerability can result in takeover of
        Instantis EnterpriseTrack.
         Affects:
         o Instantis EnterpriseTrack 17.1, 17.2, 17.3
        
        CVE-2019-0211
          7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
        Easily exploitable vulnerability allows low privileged attacker with
        logon to the infrastructure where Instantis EnterpriseTrack executes
        to compromise Instantis EnterpriseTrack. Successful attacks of this
        vulnerability can result in takeover of Instantis EnterpriseTrack.
         Affects:
         o Instantis EnterpriseTrack 17.1, 17.2, 17.3
        
        CVE-2019-0227
          7.5 AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
        Difficult to exploit vulnerability allows unauthenticated attacker
        with access to the physical communication segment attached to the
        hardware where the Instantis EnterpriseTrack executes to compromise
        Instantis EnterpriseTrack. Successful attacks of this vulnerability
        can result in takeover of Instantis EnterpriseTrack.
         Affects:
         o Instantis EnterpriseTrack 17.1, 17.2, 17.3
        [WARNING] Found details of CVE vary depending upon products
        [WARNING] Found details of CVE vary depending upon products
        [WARNING] Found details of CVE vary depending upon products
        
        CVE-2017-12626
          7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
        Easily exploitable vulnerability allows unauthenticated attacker with
        network access via HTTP to compromise Instantis EnterpriseTrack.
        Successful attacks of this vulnerability can result in unauthorized
        ability to cause a hang or frequently repeatable crash (complete DOS)
        of Instantis EnterpriseTrack.
         Affects:
         o Instantis EnterpriseTrack 17.1, 17.2, 17.3
         o Primavera Gateway 17.12
         o Primavera P6 Enterprise Project Portfolio Management
           15.1.0-15.2.18, 16.1.0-16.2.18, 17.1.0-17.12.14, 18.1.0-18.8.13
         o Primavera Unifier 16.1, 16.2, 17.7-17.12, 18.8
        
        CVE-2019-2976
          6.8 AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N
        Easily exploitable vulnerability allows low privileged attacker with
        network access via HTTP to compromise Primavera P6 Enterprise Project
        Portfolio Management. Successful attacks require human interaction
        from a person other than the attacker and while the vulnerability is
        in Primavera P6 Enterprise Project Portfolio Management, attacks may
        significantly impact additional products. Successful attacks of this
        vulnerability can result in unauthorized access to critical data or
        complete access to all Primavera P6 Enterprise Project Portfolio
        Management accessible data.
         Affects:
         o Primavera P6 Enterprise Project Portfolio Management
           17.1.0-17.12.12
        
        CVE-2019-11358
          6.1 AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
        Easily exploitable vulnerability allows unauthenticated attacker with
        network access via HTTP to compromise Primavera Unifier. Successful
        attacks require human interaction from a person other than the
        attacker and while the vulnerability is in Primavera Unifier, attacks
        may significantly impact additional products. Successful attacks of
        this vulnerability can result in unauthorized update, insert or
        delete access to some of Primavera Unifier accessible data as well as
        unauthorized read access to a subset of Primavera Unifier accessible
        data.
         Affects:
         o Primavera Unifier 16.1, 16.2, 17.7-17.12, 18.8" [2]


MITIGATION

        Oracle states:
        
        "Due to the threat posed by a successful attack, Oracle strongly
        recommends that customers apply CPU fixes as soon as possible. Until
        you apply the CPU fixes, it may be possible to reduce the risk of
        successful attack by blocking network protocols required by an
        attack. For attacks that require certain privileges or access to
        certain packages, removing the privileges or the ability to access
        the packages from users that do not need the privileges may help
        reduce the risk of successful attack. Both approaches may break
        application functionality, so Oracle strongly recommends that
        customers test changes on non-production systems. Neither approach
        should be considered a long-term solution as neither corrects the
        underlying problem." [1]


REFERENCES

        [1] Oracle Critical Patch Update Advisory - October 2019
            https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html

        [2] Text Form of Oracle Critical Patch Update - October 2019 Risk
            Matrices
            https://www.oracle.com/technetwork/security-advisory/cpuoct2019verbose-5072833.html

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=dSov
-----END PGP SIGNATURE-----