Files
CVEs-PoC/2018/CVE-2018-3184.md
T
2024-06-18 02:51:15 +02:00

18 lines
1.5 KiB
Markdown

### [CVE-2018-3184](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3184)
![](https://img.shields.io/static/v1?label=Product&message=Hyperion%20BI%2B&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%2011.1.2.4%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Easily%20exploitable%20vulnerability%20allows%20high%20privileged%20attacker%20with%20network%20access%20via%20HTTP%20to%20compromise%20Hyperion%20BI%2B.%20%20Successful%20attacks%20require%20human%20interaction%20from%20a%20person%20other%20than%20the%20attacker.%20Successful%20attacks%20of%20this%20vulnerability%20can%20result%20in%20%20unauthorized%20read%20access%20to%20a%20subset%20of%20Hyperion%20BI%2B%20accessible%20data.&color=brighgreen)
### Description
Vulnerability in the Hyperion BI+ component of Oracle Hyperion (subcomponent: IQR - Foundation Services). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion BI+. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Hyperion BI+ accessible data. CVSS 3.0 Base Score 2.4 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N).
### POC
#### Reference
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
#### Github
No PoCs found on GitHub currently.