Skip to main content

CVE-2024-20979: Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data as well as unauthorized read access to a subset of Oracle BI Publisher accessible data. in Oracle Corporation BI Publisher (formerly XML Publisher)

Medium
VulnerabilityCVE-2024-20979cvecve-2024-20979
Published: Tue Jan 16 2024 (01/16/2024, 21:41:24 UTC)
Source: CVE Database V5
Vendor/Project: Oracle Corporation
Product: BI Publisher (formerly XML Publisher)

Description

Vulnerability in the Oracle BI Publisher product of Oracle Analytics (component: Web Server). Supported versions that are affected are 6.4.0.0.0, 7.0.0.0.0 and 12.2.1.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle BI Publisher. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle BI Publisher, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle BI Publisher accessible data as well as unauthorized read access to a subset of Oracle BI Publisher accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).

AI-Powered Analysis

AILast updated: 07/04/2025, 13:10:15 UTC

Technical Analysis

CVE-2024-20979 is a medium-severity vulnerability affecting Oracle BI Publisher, a component of Oracle Analytics used for enterprise reporting and data visualization. The vulnerability exists in the web server component of BI Publisher versions 6.4.0.0.0, 7.0.0.0.0, and 12.2.1.4.0. It allows a low-privileged attacker with network access via HTTP to compromise the system, but successful exploitation requires user interaction from a person other than the attacker. The vulnerability enables unauthorized update, insert, or delete operations on some data accessible through BI Publisher, as well as unauthorized read access to a subset of that data. The CVSS 3.1 base score is 5.4, reflecting a medium severity level, with impacts on confidentiality and integrity but no impact on availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), requiring low privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. The CWE classification is CWE-285, indicating improper authorization. Although the vulnerability is in BI Publisher, exploitation could affect additional Oracle products due to scope change. No known exploits are currently reported in the wild, and no patches are linked in the provided information. The requirement for user interaction and low privileges suggests phishing or social engineering could be involved in exploitation. The vulnerability could lead to unauthorized data manipulation and disclosure, potentially impacting business operations and data confidentiality within organizations using affected Oracle BI Publisher versions.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, especially for enterprises relying on Oracle BI Publisher for critical reporting and analytics. Unauthorized data modification or disclosure could lead to compliance violations under GDPR, particularly if personal or sensitive data is exposed or altered. The integrity compromise could affect decision-making processes based on BI Publisher reports, leading to operational disruptions or financial inaccuracies. The requirement for user interaction means that social engineering defenses are critical. The scope change indicates that the impact could extend beyond BI Publisher itself, potentially affecting integrated Oracle systems and amplifying the damage. Organizations in sectors such as finance, healthcare, government, and manufacturing, which often use Oracle Analytics solutions, may face increased risks. Additionally, the medium severity score suggests that while the vulnerability is not critical, it should not be ignored, as exploitation could facilitate further attacks or data breaches.

Mitigation Recommendations

European organizations should implement targeted mitigations beyond generic advice: 1) Apply Oracle's security advisories promptly once patches become available for the affected BI Publisher versions. 2) Restrict network access to Oracle BI Publisher web interfaces to trusted internal networks or VPNs to reduce exposure to external attackers. 3) Enhance user awareness training focused on phishing and social engineering tactics, as exploitation requires user interaction. 4) Implement strict access controls and least privilege principles for BI Publisher users to limit the potential damage from compromised accounts. 5) Monitor BI Publisher logs and network traffic for unusual activities indicative of exploitation attempts, such as unauthorized data modifications or access patterns. 6) Consider deploying web application firewalls (WAFs) with rules tailored to detect and block suspicious HTTP requests targeting BI Publisher. 7) Review and audit integrations between BI Publisher and other Oracle products to understand and mitigate the scope change impact. 8) Establish incident response plans that include scenarios involving BI Publisher compromise to ensure rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
oracle
Date Reserved
2023-12-07T22:28:10.637Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683f4260182aa0cae288184b

Added to database: 6/3/2025, 6:43:44 PM

Last enriched: 7/4/2025, 1:10:15 PM

Last updated: 7/30/2025, 7:19:11 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats