SB2022102035 - Multiple vulnerabilities in Oracle WebCenter Sites
Published: October 20, 2022 Updated: August 16, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Resource exhaustion (CVE-ID: CVE-2021-43859)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
2) Incorrect Regular Expression (CVE-ID: CVE-2022-24729)
The vulnerability allows a remote attacker to perform regular expression denial of service attack.
The vulnerability exists due to improper input validation in CKEditor 4 dialog plugin. A remote attacker can pass specially crafted input to the application and perform regular expression denial of service (ReDoS) attack.
3) Improper Authentication (CVE-ID: CVE-2022-32532)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to an error in RegexRequestMatcher configuration. A remote attacker can bypass authentication process and gain unauthorized access to the application. Applications using RegExPatternMatcher with `.` in the regular expression are affected by the vulnerability.
4) Code Injection (CVE-ID: CVE-2021-23450)
The disclosed vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can inject and execute arbitrary script code via the setObject function.
Remediation
Install update from vendor's website.