All the vulnerabilites related to SAP SE - SAP NetWeaver
cve-2018-2363
Vulnerability from cvelistv5
Published
2018-01-09 15:00
Modified
2024-08-05 04:14
Severity ?
EPSS score ?
Summary
SAP NetWeaver, SAP BASIS from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52, contains code that allows you to execute arbitrary program code of the user's choice. A malicious user can therefore control the behaviour of the system or can potentially escalate privileges by executing malicious code without legitimate credentials.
References
▼ | URL | Tags |
---|---|---|
https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/ | x_refsource_CONFIRM | |
https://launchpad.support.sap.com/#/notes/1906212 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/102449 | vdb-entry, x_refsource_BID | |
https://launchpad.support.sap.com/#/notes/2525392 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
SAP SE | SAP NetWeaver |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:14:39.709Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/1906212" }, { "name": "102449", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/102449" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2525392" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP NetWeaver", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "7.00" }, { "status": "affected", "version": "7.02" }, { "status": "affected", "version": "7.10" }, { "status": "affected", "version": "7.11" }, { "status": "affected", "version": "7.30" }, { "status": "affected", "version": "7.31" }, { "status": "affected", "version": "7.40" }, { "status": "affected", "version": "7.50" }, { "status": "affected", "version": "7.52" } ] } ], "datePublic": "2018-01-09T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP NetWeaver, SAP BASIS from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52, contains code that allows you to execute arbitrary program code of the user\u0027s choice. A malicious user can therefore control the behaviour of the system or can potentially escalate privileges by executing malicious code without legitimate credentials." } ], "problemTypes": [ { "descriptions": [ { "description": "Code Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-11T10:57:01", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://launchpad.support.sap.com/#/notes/1906212" }, { "name": "102449", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/102449" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://launchpad.support.sap.com/#/notes/2525392" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2018-2363", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP NetWeaver", "version": { "version_data": [ { "version_affected": "=", "version_value": "7.00" }, { "version_affected": "=", "version_value": "7.02" }, { "version_affected": "=", "version_value": "7.10" }, { "version_affected": "=", "version_value": "7.11" }, { "version_affected": "=", "version_value": "7.30" }, { "version_affected": "=", "version_value": "7.31" }, { "version_affected": "=", "version_value": "7.40" }, { "version_affected": "=", "version_value": "7.50" }, { "version_affected": "=", "version_value": "7.52" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP NetWeaver, SAP BASIS from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52, contains code that allows you to execute arbitrary program code of the user\u0027s choice. A malicious user can therefore control the behaviour of the system or can potentially escalate privileges by executing malicious code without legitimate credentials." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/", "refsource": "CONFIRM", "url": "https://blogs.sap.com/2018/01/09/sap-security-patch-day-january-2018/" }, { "name": "https://launchpad.support.sap.com/#/notes/1906212", "refsource": "CONFIRM", "url": "https://launchpad.support.sap.com/#/notes/1906212" }, { "name": "102449", "refsource": "BID", "url": "http://www.securityfocus.com/bid/102449" }, { "name": "https://launchpad.support.sap.com/#/notes/2525392", "refsource": "CONFIRM", "url": "https://launchpad.support.sap.com/#/notes/2525392" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2018-2363", "datePublished": "2018-01-09T15:00:00", "dateReserved": "2017-12-15T00:00:00", "dateUpdated": "2024-08-05T04:14:39.709Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-38183
Vulnerability from cvelistv5
Published
2021-10-12 14:04
Modified
2024-08-04 01:37
Severity ?
EPSS score ?
Summary
SAP NetWeaver - versions 700, 701, 702, 730, does not sufficiently encode user-controlled inputs, allowing an attacker to cause a potential victim to supply a malicious content to a vulnerable web application, which is then reflected to the victim and executed by the web browser, resulting in Cross-Site Scripting vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 | x_refsource_MISC | |
https://launchpad.support.sap.com/#/notes/3084937 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
SAP SE | SAP NetWeaver |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:37:16.304Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/3084937" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP NetWeaver", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c 700" }, { "status": "affected", "version": "\u003c 701" }, { "status": "affected", "version": "\u003c 702" }, { "status": "affected", "version": "\u003c 730" } ] } ], "descriptions": [ { "lang": "en", "value": "SAP NetWeaver - versions 700, 701, 702, 730, does not sufficiently encode user-controlled inputs, allowing an attacker to cause a potential victim to supply a malicious content to a vulnerable web application, which is then reflected to the victim and executed by the web browser, resulting in Cross-Site Scripting vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-10-12T14:04:07", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/3084937" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2021-38183", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP NetWeaver", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "700" }, { "version_name": "\u003c", "version_value": "701" }, { "version_name": "\u003c", "version_value": "702" }, { "version_name": "\u003c", "version_value": "730" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP NetWeaver - versions 700, 701, 702, 730, does not sufficiently encode user-controlled inputs, allowing an attacker to cause a potential victim to supply a malicious content to a vulnerable web application, which is then reflected to the victim and executed by the web browser, resulting in Cross-Site Scripting vulnerability." } ] }, "impact": { "cvss": { "baseScore": "null", "vectorString": "null", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983", "refsource": "MISC", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983" }, { "name": "https://launchpad.support.sap.com/#/notes/3084937", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/3084937" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2021-38183", "datePublished": "2021-10-12T14:04:07", "dateReserved": "2021-08-07T00:00:00", "dateUpdated": "2024-08-04T01:37:16.304Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }