All the vulnerabilites related to SAP - SAP_ABA
cve-2016-4551
Vulnerability from cvelistv5
Published
2016-10-05 16:00
Modified
2024-08-06 00:32
Severity ?
EPSS score ?
Summary
The (1) SAP_BASIS and (2) SAP_ABA components 7.00 SP Level 0031 in SAP NetWeaver 2004s might allow remote attackers to spoof IP addresses written to the Security Audit Log via vectors related to the network landscape, aka SAP Security Note 2190621.
References
▼ | URL | Tags |
---|---|---|
http://seclists.org/fulldisclosure/2016/Oct/3 | mailing-list, x_refsource_FULLDISC | |
https://www.onapsis.com/research/security-advisories/sap-security-audit-log-invalid-address-logging | x_refsource_MISC | |
http://www.securityfocus.com/bid/93288 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T00:32:25.832Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20161003 Onapsis Security Advisory ONAPSIS-2016-036: SAP Security Audit Log invalid address logging", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2016/Oct/3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.onapsis.com/research/security-advisories/sap-security-audit-log-invalid-address-logging" }, { "name": "93288", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/93288" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-09-22T00:00:00", "descriptions": [ { "lang": "en", "value": "The (1) SAP_BASIS and (2) SAP_ABA components 7.00 SP Level 0031 in SAP NetWeaver 2004s might allow remote attackers to spoof IP addresses written to the Security Audit Log via vectors related to the network landscape, aka SAP Security Note 2190621." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20161003 Onapsis Security Advisory ONAPSIS-2016-036: SAP Security Audit Log invalid address logging", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2016/Oct/3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.onapsis.com/research/security-advisories/sap-security-audit-log-invalid-address-logging" }, { "name": "93288", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/93288" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2016-4551", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The (1) SAP_BASIS and (2) SAP_ABA components 7.00 SP Level 0031 in SAP NetWeaver 2004s might allow remote attackers to spoof IP addresses written to the Security Audit Log via vectors related to the network landscape, aka SAP Security Note 2190621." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20161003 Onapsis Security Advisory ONAPSIS-2016-036: SAP Security Audit Log invalid address logging", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2016/Oct/3" }, { "name": "https://www.onapsis.com/research/security-advisories/sap-security-audit-log-invalid-address-logging", "refsource": "MISC", "url": "https://www.onapsis.com/research/security-advisories/sap-security-audit-log-invalid-address-logging" }, { "name": "93288", "refsource": "BID", "url": "http://www.securityfocus.com/bid/93288" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2016-4551", "datePublished": "2016-10-05T16:00:00", "dateReserved": "2016-05-06T00:00:00", "dateUpdated": "2024-08-06T00:32:25.832Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-2481
Vulnerability from cvelistv5
Published
2018-11-13 20:00
Modified
2024-08-05 04:21
Severity ?
EPSS score ?
Summary
In some SAP standard roles, in SAP_ABA versions, 7.00 to 7.02, 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50, 75C to 75D, a transaction code reserved for customer is used. By implementing such transaction code a malicious user may execute unauthorized transaction functionality.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/105906 | vdb-entry, x_refsource_BID | |
https://launchpad.support.sap.com/#/notes/2693083 | x_refsource_MISC | |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832 | x_refsource_MISC |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:21:34.036Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "105906", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/105906" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2693083" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP_ABA", "vendor": "SAP", "versions": [ { "status": "affected", "version": "= 7.00 to 7.02" }, { "status": "affected", "version": "= 7.10 to 7.11" }, { "status": "affected", "version": "= 7.30" }, { "status": "affected", "version": "= 7.31" }, { "status": "affected", "version": "= 7.40" }, { "status": "affected", "version": "= 7.50" }, { "status": "affected", "version": "= 7.5C" }, { "status": "affected", "version": "= 7.5D" } ] } ], "datePublic": "2018-11-13T00:00:00", "descriptions": [ { "lang": "en", "value": "In some SAP standard roles, in SAP_ABA versions, 7.00 to 7.02, 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50, 75C to 75D, a transaction code reserved for customer is used. By implementing such transaction code a malicious user may execute unauthorized transaction functionality." } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-11-14T10:57:02", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "name": "105906", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/105906" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/2693083" }, { "tags": [ "x_refsource_MISC" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832" } ], "source": { "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2018-2481", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP_ABA", "version": { "version_data": [ { "version_name": "=", "version_value": "7.00 to 7.02" }, { "version_name": "=", "version_value": "7.10 to 7.11" }, { "version_name": "=", "version_value": "7.30" }, { "version_name": "=", "version_value": "7.31" }, { "version_name": "=", "version_value": "7.40" }, { "version_name": "=", "version_value": "7.50" }, { "version_name": "=", "version_value": "7.5C" }, { "version_name": "=", "version_value": "7.5D" } ] } } ] }, "vendor_name": "SAP" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In some SAP standard roles, in SAP_ABA versions, 7.00 to 7.02, 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50, 75C to 75D, a transaction code reserved for customer is used. By implementing such transaction code a malicious user may execute unauthorized transaction functionality." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Other" } ] } ] }, "references": { "reference_data": [ { "name": "105906", "refsource": "BID", "url": "http://www.securityfocus.com/bid/105906" }, { "name": "https://launchpad.support.sap.com/#/notes/2693083", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/2693083" }, { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832", "refsource": "MISC", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=503809832" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2018-2481", "datePublished": "2018-11-13T20:00:00", "dateReserved": "2017-12-15T00:00:00", "dateUpdated": "2024-08-05T04:21:34.036Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2016-10-05 16:59
Modified
2024-11-21 02:52
Severity ?
Summary
The (1) SAP_BASIS and (2) SAP_ABA components 7.00 SP Level 0031 in SAP NetWeaver 2004s might allow remote attackers to spoof IP addresses written to the Security Audit Log via vectors related to the network landscape, aka SAP Security Note 2190621.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://seclists.org/fulldisclosure/2016/Oct/3 | Mailing List, Third Party Advisory | |
cve@mitre.org | http://www.securityfocus.com/bid/93288 | ||
cve@mitre.org | https://www.onapsis.com/research/security-advisories/sap-security-audit-log-invalid-address-logging | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2016/Oct/3 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/93288 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.onapsis.com/research/security-advisories/sap-security-audit-log-invalid-address-logging | Permissions Required, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:netweaver:2004s:*:*:*:*:*:*:*", "matchCriteriaId": "EB3FC705-6497-44AE-A520-809D320C1380", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sap_aba:7.00:sp_level_0031:*:*:*:*:*:*", "matchCriteriaId": "0E4A33ED-CD2B-46B7-BD20-EEAF88B012D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sap_basis:7.00:sp_level_0031:*:*:*:*:*:*", "matchCriteriaId": "C0CC87F8-734E-4EE4-9966-6204374CF704", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) SAP_BASIS and (2) SAP_ABA components 7.00 SP Level 0031 in SAP NetWeaver 2004s might allow remote attackers to spoof IP addresses written to the Security Audit Log via vectors related to the network landscape, aka SAP Security Note 2190621." }, { "lang": "es", "value": "Los componentes (1) SAP_BASIS y (2) SAP_ABA 7.00 SP Level 0031 en SAP NetWeaver 2004s podr\u00eda permitir a atacantes remotos suplantar direcciones IP escritas en el Security Audit Log a trav\u00e9s de vectores relacionados con el entorno de red, vulnerabilidad tambi\u00e9n conocida como SAP Security Note 2190621." } ], "id": "CVE-2016-4551", "lastModified": "2024-11-21T02:52:27.657", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-10-05T16:59:02.757", "references": [ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Oct/3" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/93288" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://www.onapsis.com/research/security-advisories/sap-security-audit-log-invalid-address-logging" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2016/Oct/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/93288" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://www.onapsis.com/research/security-advisories/sap-security-audit-log-invalid-address-logging" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }