Oracle Business Intelligence Enterprise Edition信息泄露漏洞
CVE编号
CVE-2021-2025利用情况
暂无补丁情况
N/A披露时间
2021-01-21漏洞描述
Oracle Business Intelligence Enterprise Edition (OBIEE)是Oracle公司的商业智能(BI)工具。 Oracle Business Intelligence Enterprise Edition 5.5.0.0.0、11.1.1.9.0、12.2.1.3.0、12.2.1.4.0中的Analytics Web General组件存在未明漏洞。攻击者可利用该漏洞影响机密性和完整性。解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://www.oracle.com/security-alerts/cpujan2021.html
参考链接 |
|
---|---|
https://www.oracle.com/security-alerts/cpujan2021.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | oracle | business_intelligence | 11.1.1.9.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | business_intelligence | 12.2.1.3.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | business_intelligence | 12.2.1.4.0 | - | |||||
运行在以下环境 | |||||||||
应用 | oracle | business_intelligence | 5.5.0.0.0 | - | |||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | samba | * | Up to (excluding) 4.10.16-18.59.amzn1 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | ruby-libguestfs | * | Up to (excluding) 1.40.2-28.0.1 | |||||
运行在以下环境 | |||||||||
系统 | fedora_32 | samba-client-debuginfo | * | Up to (excluding) 4.12.15-0.fc32 | |||||
运行在以下环境 | |||||||||
系统 | fedora_33 | samba-client-debuginfo | * | Up to (excluding) 4.13.8-0.fc33 | |||||
运行在以下环境 | |||||||||
系统 | fedora_34 | samba-test | * | Up to (excluding) 4.14.4-0.fc34 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10 | qemu | * | Up to (excluding) 4.10.16-18.el7_9.ns7.01 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP1 | qemu | * | Up to (excluding) 4.11.12-8.p02.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP2 | qemu | * | Up to (excluding) 4.11.12-8.p01.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP3 | qemu | * | Up to (excluding) 4.1.0-63.p16.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_loongarch64_V10SP1 | qemu-guest-agent | * | Up to (excluding) 4.11.12-8.p02.a.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_loongarch64_V10SP3 | qemu | * | Up to (excluding) 4.1.0-63.p08.a.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10 | qemu | * | Up to (excluding) 4.10.16-18.el7_9.ns7.01 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP1 | qemu | * | Up to (excluding) 4.11.12-8.p02.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP2 | qemu | * | Up to (excluding) 4.11.12-8.p01.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP3 | qemu | * | Up to (excluding) 4.1.0-63.p16.ky10 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | qemu-seabios | * | Up to (excluding) 4.11.14 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | qemu-s390 | * | Up to (excluding) 4.13.6 | |||||
运行在以下环境 | |||||||||
系统 | oracle_7 | oraclelinux-release | * | Up to (excluding) 4.2.1-10.el7 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | libvirt-daemon-driver-storage-gluster | * | Up to (excluding) 1.16.2-4.0.1.module+el8.4.0+20319+6eb4347c | |||||
运行在以下环境 | |||||||||
系统 | redhat_7 | ctdb | * | Up to (excluding) 0:4.10.16-15.el7_9 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | xen | * | Up to (excluding) 3.1.1.1-48.2 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04.7_lts | samba | * | Up to (excluding) 2:4.3.11+dfsg-0ubuntu0.16.04.34 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04.5_lts | qemu | * | Up to (excluding) 2021-09-16 | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 已更改
- 用户交互 需要
- 可用性 无
- 保密性 高
- 完整性 低
CWE-ID | 漏洞类型 |
NVD-CWE-noinfo |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论