Vulnerabilites related to sap - abap_platform
CVE-2020-6299 (GCVE-0-2020-6299)
Vulnerability from cvelistv5
Published
2020-08-12 13:43
Modified
2024-08-04 08:55
Summary
SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 740, 750, 751, 752, 753, 754, 755, allows a business user to access the list of users in the given system using value help, leading to Information Disclosure.
Impacted products
Vendor Product Version
SAP SE SAP NetWeaver (ABAP Server) and ABAP Platform Version: < 740
Version: < 750
Version: < 751
Version: < 752
Version: < 753
Version: < 754
Version: < 755
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:55:22.302Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2941510",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP NetWeaver (ABAP Server) and ABAP Platform",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 740",
                  },
                  {
                     status: "affected",
                     version: "< 750",
                  },
                  {
                     status: "affected",
                     version: "< 751",
                  },
                  {
                     status: "affected",
                     version: "< 752",
                  },
                  {
                     status: "affected",
                     version: "< 753",
                  },
                  {
                     status: "affected",
                     version: "< 754",
                  },
                  {
                     status: "affected",
                     version: "< 755",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 740, 750, 751, 752, 753, 754, 755, allows a business user to access the list of users in the given system using value help, leading to Information Disclosure.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-08-12T13:43:57",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2941510",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2020-6299",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP NetWeaver (ABAP Server) and ABAP Platform",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "740",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "750",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "751",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "752",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "753",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "754",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "755",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 740, 750, 751, 752, 753, 754, 755, allows a business user to access the list of users in the given system using value help, leading to Information Disclosure.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "4.3",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2941510",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2941510",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2020-6299",
      datePublished: "2020-08-12T13:43:57",
      dateReserved: "2020-01-08T00:00:00",
      dateUpdated: "2024-08-04T08:55:22.302Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2023-29109 (GCVE-0-2023-29109)
Vulnerability from cvelistv5
Published
2023-04-11 02:58
Modified
2025-02-07 16:52
Summary
The SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.
Impacted products
Vendor Product Version
SAP Application Interface Framework (Message Dashboard) Version: AIF 703
Version: AIFX 702
Version: S4CORE 101
Version: SAP_BASIS 755
Version: SAP_BASIS 756
Version: SAP_ABA 75C
Version: SAP_ABA 75D
Version: SAP_ABA 75E
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T14:00:15.862Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/3115598",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-29109",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-07T16:52:01.499322Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-07T16:52:14.949Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Application Interface Framework (Message Dashboard)",
               vendor: "SAP",
               versions: [
                  {
                     status: "affected",
                     version: "AIF 703",
                  },
                  {
                     status: "affected",
                     version: "AIFX 702",
                  },
                  {
                     status: "affected",
                     version: "S4CORE 101",
                  },
                  {
                     status: "affected",
                     version: "SAP_BASIS 755",
                  },
                  {
                     status: "affected",
                     version: "SAP_BASIS 756",
                  },
                  {
                     status: "affected",
                     version: "SAP_ABA 75C",
                  },
                  {
                     status: "affected",
                     version: "SAP_ABA 75D",
                  },
                  {
                     status: "affected",
                     version: "SAP_ABA 75E",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>The SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.</p>",
                  },
               ],
               value: "The SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-1236",
                     description: "CWE-1236: Improper Neutralization of Formula Elements in a CSV File",
                     lang: "eng",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-11T20:17:39.130Z",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               url: "https://launchpad.support.sap.com/#/notes/3115598",
            },
            {
               url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Code Injection vulnerability in SAP Application Interface Framework (Message Dashboard)",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2023-29109",
      datePublished: "2023-04-11T02:58:49.648Z",
      dateReserved: "2023-03-31T10:01:53.360Z",
      dateUpdated: "2025-02-07T16:52:14.949Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2024-27900 (GCVE-0-2024-27900)
Vulnerability from cvelistv5
Published
2024-03-12 00:44
Modified
2025-04-16 15:40
Summary
Due to missing authorization check, attacker with business user account in SAP ABAP Platform - version 758, 795, can change the privacy setting of job templates from shared to private. As a result, the selected template would only be accessible to the owner.
Impacted products
Vendor Product Version
SAP_SE SAP ABAP Platform Version: 758
Version: 795
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-27900",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-03-12T17:46:21.338700Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-04-16T15:40:05.874Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T00:41:55.483Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://me.sap.com/notes/3419022",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "SAP ABAP Platform",
               vendor: "SAP_SE",
               versions: [
                  {
                     status: "affected",
                     version: "758",
                  },
                  {
                     status: "affected",
                     version: "795",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Due to missing authorization check, attacker with business user account in SAP ABAP Platform - version 758, 795, can change the privacy setting of job templates from shared to private. As a result, the selected template would only be accessible to the owner.</p>",
                  },
               ],
               value: "Due to missing authorization check, attacker with business user account in SAP ABAP Platform - version 758, 795, can change the privacy setting of job templates from shared to private. As a result, the selected template would only be accessible to the owner.\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-862",
                     description: "CWE-862: Missing Authorization",
                     lang: "eng",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-03-12T00:44:15.235Z",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               url: "https://me.sap.com/notes/3419022",
            },
            {
               url: "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Missing Authorization check in SAP ABAP Platform",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2024-27900",
      datePublished: "2024-03-12T00:44:15.235Z",
      dateReserved: "2024-02-27T06:26:16.787Z",
      dateUpdated: "2025-04-16T15:40:05.874Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2023-29110 (GCVE-0-2023-29110)
Vulnerability from cvelistv5
Published
2023-04-11 03:00
Modified
2025-02-07 17:13
Summary
The SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.
Impacted products
Vendor Product Version
SAP Application Interface Framework (Message Dashboard) Version: AIF 703
Version: AIFX 702
Version: S4CORE 100
Version: S4CORE 101
Version: SAP_BASIS 755
Version: SAP_BASIS 756
Version: SAP_ABA 75C
Version: SAP_ABA 75D
Version: SAP_ABA 75E
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T14:00:15.878Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/3113349",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-29110",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-07T17:13:12.939238Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-07T17:13:23.603Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "Application Interface Framework (Message Dashboard)",
               vendor: "SAP",
               versions: [
                  {
                     status: "affected",
                     version: "AIF 703",
                  },
                  {
                     status: "affected",
                     version: "AIFX 702",
                  },
                  {
                     status: "affected",
                     version: "S4CORE 100",
                  },
                  {
                     status: "affected",
                     version: "S4CORE 101",
                  },
                  {
                     status: "affected",
                     version: "SAP_BASIS 755",
                  },
                  {
                     status: "affected",
                     version: "SAP_BASIS 756",
                  },
                  {
                     status: "affected",
                     version: "SAP_ABA 75C",
                  },
                  {
                     status: "affected",
                     version: "SAP_ABA 75D",
                  },
                  {
                     status: "affected",
                     version: "SAP_ABA 75E",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>The SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.</p>",
                  },
               ],
               value: "The SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 3.7,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-80",
                     description: "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
                     lang: "eng",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-11T20:17:48.094Z",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               url: "https://launchpad.support.sap.com/#/notes/3113349",
            },
            {
               url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Code Injection vulnerability in SAP Application Interface Framework (Message Dashboard)",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2023-29110",
      datePublished: "2023-04-11T03:00:17.210Z",
      dateReserved: "2023-03-31T10:01:53.360Z",
      dateUpdated: "2025-02-07T17:13:23.603Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-6181 (GCVE-0-2020-6181)
Vulnerability from cvelistv5
Published
2020-02-12 19:46
Modified
2024-08-04 08:55
Summary
Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.
Impacted products
Vendor Product Version
SAP SE SAP NetWeaver (SAP Basis) Version: = 7.02
Version: = 7.30
Version: = 7.31
Version: = 7.40
Create a notification for this product.
   SAP SE SAP ABAP Platform (SAP Basis) Version: = 7.50
Version: = 7.51
Version: = 7.52
Version: = 7.53
Version: = 7.54
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:55:22.112Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2880744",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP NetWeaver (SAP Basis)",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "= 7.02",
                  },
                  {
                     status: "affected",
                     version: "= 7.30",
                  },
                  {
                     status: "affected",
                     version: "= 7.31",
                  },
                  {
                     status: "affected",
                     version: "= 7.40",
                  },
               ],
            },
            {
               product: "SAP ABAP Platform (SAP Basis)",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "= 7.50",
                  },
                  {
                     status: "affected",
                     version: "= 7.51",
                  },
                  {
                     status: "affected",
                     version: "= 7.52",
                  },
                  {
                     status: "affected",
                     version: "= 7.53",
                  },
                  {
                     status: "affected",
                     version: "= 7.54",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.8,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "HTTP Response Splitting",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-12T19:46:52",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2880744",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2020-6181",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP NetWeaver (SAP Basis)",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "=",
                                          version_value: "7.02",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "7.30",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "7.31",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "7.40",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SAP ABAP Platform (SAP Basis)",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "=",
                                          version_value: "7.50",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "7.51",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "7.52",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "7.53",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "7.54",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "5.8",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "HTTP Response Splitting",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2880744",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2880744",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2020-6181",
      datePublished: "2020-02-12T19:46:52",
      dateReserved: "2020-01-08T00:00:00",
      dateUpdated: "2024-08-04T08:55:22.112Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2024-22131 (GCVE-0-2024-22131)
Vulnerability from cvelistv5
Published
2024-02-13 02:30
Modified
2024-08-01 22:35
Severity ?
Summary
In SAP ABA (Application Basis) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I, an attacker authenticated as a user with a remote execution authorization can use a vulnerable interface. This allows the attacker to use the interface to invoke an application function to perform actions which they would not normally be permitted to perform.  Depending on the function executed, the attack can read or modify any user/business data and can make the entire system unavailable.
Impacted products
Vendor Product Version
SAP_SE SAP ABA (Application Basis) Version: 700
Version: 701
Version: 702
Version: 731
Version: 740
Version: 750
Version: 751
Version: 752
Version: 75C
Version: 75I
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:sap:sap_aba:*:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "sap_aba",
                  vendor: "sap",
                  versions: [
                     {
                        status: "affected",
                        version: "700",
                     },
                     {
                        status: "affected",
                        version: "701",
                     },
                     {
                        status: "affected",
                        version: "702",
                     },
                     {
                        status: "affected",
                        version: "731",
                     },
                     {
                        status: "affected",
                        version: "740",
                     },
                     {
                        status: "affected",
                        version: "750",
                     },
                     {
                        status: "affected",
                        version: "751",
                     },
                     {
                        status: "affected",
                        version: "752",
                     },
                     {
                        status: "affected",
                        version: "75c",
                     },
                     {
                        status: "affected",
                        version: "75i",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-22131",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-04-11T04:00:52.278648Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2024-06-28T16:05:04.503Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-01T22:35:34.897Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://me.sap.com/notes/3420923",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "SAP ABA (Application Basis)",
               vendor: "SAP_SE",
               versions: [
                  {
                     status: "affected",
                     version: "700",
                  },
                  {
                     status: "affected",
                     version: "701",
                  },
                  {
                     status: "affected",
                     version: "702",
                  },
                  {
                     status: "affected",
                     version: "731",
                  },
                  {
                     status: "affected",
                     version: "740",
                  },
                  {
                     status: "affected",
                     version: "750",
                  },
                  {
                     status: "affected",
                     version: "751",
                  },
                  {
                     status: "affected",
                     version: "752",
                  },
                  {
                     status: "affected",
                     version: "75C",
                  },
                  {
                     status: "affected",
                     version: "75I",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>In SAP ABA (Application Basis) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I, an attacker authenticated as a user with a remote execution authorization can use a vulnerable interface. This allows the attacker to use the interface to invoke an application function to perform actions which they would not normally be permitted to perform.  Depending on the function executed, the attack can read or modify any user/business data and can make the entire system unavailable.</p>",
                  },
               ],
               value: "In SAP ABA (Application Basis) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I, an attacker authenticated as a user with a remote execution authorization can use a vulnerable interface. This allows the attacker to use the interface to invoke an application function to perform actions which they would not normally be permitted to perform.  Depending on the function executed, the attack can read or modify any user/business data and can make the entire system unavailable.\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.1,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-94",
                     description: "CWE-94: Improper Control of Generation of Code ('Code Injection')",
                     lang: "eng",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-02-13T02:30:51.886Z",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               url: "https://me.sap.com/notes/3420923",
            },
            {
               url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Code Injection vulnerability in SAP ABA (Application Basis)",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2024-22131",
      datePublished: "2024-02-13T02:30:51.886Z",
      dateReserved: "2024-01-05T10:21:35.256Z",
      dateUpdated: "2024-08-01T22:35:34.897Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-6310 (GCVE-0-2020-6310)
Vulnerability from cvelistv5
Published
2020-08-12 13:52
Modified
2024-08-04 08:55
Summary
Improper access control in SOA Configuration Trace component in SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 702, 730, 731, 740, 750, allows any authenticated user to enumerate all SAP users, leading to Information Disclosure.
Impacted products
Vendor Product Version
SAP SE SAP NetWeaver (ABAP Server) and ABAP Platform Version: < 702
Version: < 730
Version: < 731
Version: < 740
Version: < 750
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:55:22.287Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2944988",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP NetWeaver (ABAP Server) and ABAP Platform",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 702",
                  },
                  {
                     status: "affected",
                     version: "< 730",
                  },
                  {
                     status: "affected",
                     version: "< 731",
                  },
                  {
                     status: "affected",
                     version: "< 740",
                  },
                  {
                     status: "affected",
                     version: "< 750",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Improper access control in SOA Configuration Trace component in SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 702, 730, 731, 740, 750, allows any authenticated user to enumerate all SAP users, leading to Information Disclosure.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-08-12T13:52:51",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2944988",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2020-6310",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP NetWeaver (ABAP Server) and ABAP Platform",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "702",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "730",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "731",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "740",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "750",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Improper access control in SOA Configuration Trace component in SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 702, 730, 731, 740, 750, allows any authenticated user to enumerate all SAP users, leading to Information Disclosure.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "4.3",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2944988",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2944988",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2020-6310",
      datePublished: "2020-08-12T13:52:51",
      dateReserved: "2020-01-08T00:00:00",
      dateUpdated: "2024-08-04T08:55:22.287Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2023-25615 (GCVE-0-2023-25615)
Vulnerability from cvelistv5
Published
2023-03-14 04:40
Modified
2025-02-27 18:12
Summary
Due to insufficient input sanitization, SAP ABAP - versions 751, 753, 753, 754, 756, 757, 791, allows an authenticated high privileged user to alter the current session of the user by injecting the malicious database queries over the network and gain access to the unintended data. This may lead to a high impact on the confidentiality and no impact on the availability and integrity of the application.
Impacted products
Vendor Product Version
SAP ABAP Platform Version: 751
Version: 753
Version: 754
Version: 756
Version: 757
Version: 791
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T11:25:19.251Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/3289844",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
               },
            ],
            title: "CVE Program Container",
         },
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2023-25615",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "partial",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-02-27T18:12:10.805949Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-02-27T18:12:21.203Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "ABAP Platform",
               vendor: "SAP",
               versions: [
                  {
                     status: "affected",
                     version: "751",
                  },
                  {
                     status: "affected",
                     version: "753",
                  },
                  {
                     status: "affected",
                     version: "754",
                  },
                  {
                     status: "affected",
                     version: "756",
                  },
                  {
                     status: "affected",
                     version: "757",
                  },
                  {
                     status: "affected",
                     version: "791",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>Due to insufficient input sanitization, SAP ABAP - versions 751, 753, 753, 754, 756, 757, 791, allows an authenticated high privileged user to alter the current session of the user by injecting the malicious database queries over the network and gain access to the unintended data. This may lead to a high impact on the confidentiality and no impact on the availability and integrity of the application.</p>",
                  },
               ],
               value: "Due to insufficient input sanitization, SAP ABAP - versions 751, 753, 753, 754, 756, 757, 791, allows an authenticated high privileged user to alter the current session of the user by injecting the malicious database queries over the network and gain access to the unintended data. This may lead to a high impact on the confidentiality and no impact on the availability and integrity of the application.\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.8,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-89",
                     description: "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
                     lang: "eng",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-04-11T21:28:52.633Z",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               url: "https://launchpad.support.sap.com/#/notes/3289844",
            },
            {
               url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "SQL Injection vulnerability in SAP ABAP Platform",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2023-25615",
      datePublished: "2023-03-14T04:40:25.108Z",
      dateReserved: "2023-02-09T13:30:50.223Z",
      dateUpdated: "2025-02-27T18:12:21.203Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-6280 (GCVE-0-2020-6280)
Vulnerability from cvelistv5
Published
2020-07-14 12:30
Modified
2024-08-04 08:55
Summary
SAP NetWeaver (ABAP Server) and ABAP Platform, versions 731, 740, 750, allows an attacker with admin privileges to access certain files which should otherwise be restricted, leading to Information Disclosure.
Impacted products
Vendor Product Version
SAP SE SAP NetWeaver (ABAP Server) and ABAP Platform Version: < 731
Version: < 740
Version: < 750
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:55:22.265Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2927373",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP NetWeaver (ABAP Server) and ABAP Platform",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 731",
                  },
                  {
                     status: "affected",
                     version: "< 740",
                  },
                  {
                     status: "affected",
                     version: "< 750",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "SAP NetWeaver (ABAP Server) and ABAP Platform, versions 731, 740, 750, allows an attacker with admin privileges to access certain files which should otherwise be restricted, leading to Information Disclosure.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 2.7,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Information Disclosure",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-07-14T12:30:14",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2927373",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2020-6280",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP NetWeaver (ABAP Server) and ABAP Platform",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "731",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "740",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "750",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "SAP NetWeaver (ABAP Server) and ABAP Platform, versions 731, 740, 750, allows an attacker with admin privileges to access certain files which should otherwise be restricted, leading to Information Disclosure.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "2.7",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Information Disclosure",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2927373",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2927373",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2020-6280",
      datePublished: "2020-07-14T12:30:14",
      dateReserved: "2020-01-08T00:00:00",
      dateUpdated: "2024-08-04T08:55:22.265Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-6296 (GCVE-0-2020-6296)
Vulnerability from cvelistv5
Published
2020-08-12 13:34
Modified
2024-08-04 08:55
Summary
SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753, 755, allows an attacker to inject code that can be executed by the application, leading to Code Injection. An attacker could thereby control the behavior of the application.
Impacted products
Vendor Product Version
SAP SE SAP NetWeaver (ABAP Server) and ABAP Platform Version: < 700
Version: < 701
Version: < 702
Version: < 710
Version: < 711
Version: < 730
Version: < 731
Version: < 740
Version: < 750
Version: < 751
Version: < 753
Version: < 755
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:55:22.230Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2941667",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP NetWeaver (ABAP Server) and ABAP Platform",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 700",
                  },
                  {
                     status: "affected",
                     version: "< 701",
                  },
                  {
                     status: "affected",
                     version: "< 702",
                  },
                  {
                     status: "affected",
                     version: "< 710",
                  },
                  {
                     status: "affected",
                     version: "< 711",
                  },
                  {
                     status: "affected",
                     version: "< 730",
                  },
                  {
                     status: "affected",
                     version: "< 731",
                  },
                  {
                     status: "affected",
                     version: "< 740",
                  },
                  {
                     status: "affected",
                     version: "< 750",
                  },
                  {
                     status: "affected",
                     version: "< 751",
                  },
                  {
                     status: "affected",
                     version: "< 753",
                  },
                  {
                     status: "affected",
                     version: "< 755",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753, 755, allows an attacker to inject code that can be executed by the application, leading to Code Injection. An attacker could thereby control the behavior of the application.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 8.3,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "LOW",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Code Injection",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-08-12T13:34:40",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2941667",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2020-6296",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP NetWeaver (ABAP Server) and ABAP Platform",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "700",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "701",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "702",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "710",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "711",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "730",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "731",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "740",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "750",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "751",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "753",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "755",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753, 755, allows an attacker to inject code that can be executed by the application, leading to Code Injection. An attacker could thereby control the behavior of the application.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "8.3",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Code Injection",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2941667",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2941667",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2020-6296",
      datePublished: "2020-08-12T13:34:40",
      dateReserved: "2020-01-08T00:00:00",
      dateUpdated: "2024-08-04T08:55:22.230Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-44231 (GCVE-0-2021-44231)
Vulnerability from cvelistv5
Published
2021-12-14 15:44
Modified
2024-08-04 04:17
Severity ?
Summary
Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.
Impacted products
Vendor Product Version
SAP SE SAP ABAP Server & ABAP Platform (Translation Tools) Version: < 701
Version: < 740
Version: < 750
Version: < 751
Version: < 752
Version: < 753
Version: < 754
Version: < 755
Version: < 756
Version: < 804
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T04:17:24.557Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/3119365",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP ABAP Server & ABAP Platform (Translation Tools)",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 701",
                  },
                  {
                     status: "affected",
                     version: "< 740",
                  },
                  {
                     status: "affected",
                     version: "< 750",
                  },
                  {
                     status: "affected",
                     version: "< 751",
                  },
                  {
                     status: "affected",
                     version: "< 752",
                  },
                  {
                     status: "affected",
                     version: "< 753",
                  },
                  {
                     status: "affected",
                     version: "< 754",
                  },
                  {
                     status: "affected",
                     version: "< 755",
                  },
                  {
                     status: "affected",
                     version: "< 756",
                  },
                  {
                     status: "affected",
                     version: "< 804",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Code injection",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-12-14T15:44:08",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/3119365",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2021-44231",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP ABAP Server & ABAP Platform (Translation Tools)",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "701",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "740",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "750",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "751",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "752",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "753",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "754",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "755",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "756",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "804",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "null",
                  vectorString: "null",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Code injection",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/3119365",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/3119365",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2021-44231",
      datePublished: "2021-12-14T15:44:08",
      dateReserved: "2021-11-26T00:00:00",
      dateUpdated: "2024-08-04T04:17:24.557Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2020-6318 (GCVE-0-2020-6318)
Vulnerability from cvelistv5
Published
2020-09-09 12:46
Modified
2024-08-04 08:55
Severity ?
Summary
A Remote Code Execution vulnerability exists in the SAP NetWeaver (ABAP Server, up to release 7.40) and ABAP Platform (> release 7.40).Because of this, an attacker can exploit these products via Code Injection, and potentially enabling to take complete control of the products, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the products to terminate.
Impacted products
Vendor Product Version
SAP SE SAP NetWeaver (ABAP Server) and ABAP Platform Version: < 700
Version: < 701
Version: < 702
Version: < 710
Version: < 711
Version: < 730
Version: < 731
Version: < 740
Version: < 750
Version: < 751
Version: < 752
Version: < 753
Version: < 754
Version: < 755
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:55:22.456Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2958563",
               },
               {
                  name: "20220518 SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP Application Server, ABAP and ABAP Platform (Different Software Components)",
                  tags: [
                     "mailing-list",
                     "x_refsource_FULLDISC",
                     "x_transferred",
                  ],
                  url: "http://seclists.org/fulldisclosure/2022/May/42",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP NetWeaver (ABAP Server) and ABAP Platform",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 700",
                  },
                  {
                     status: "affected",
                     version: "< 701",
                  },
                  {
                     status: "affected",
                     version: "< 702",
                  },
                  {
                     status: "affected",
                     version: "< 710",
                  },
                  {
                     status: "affected",
                     version: "< 711",
                  },
                  {
                     status: "affected",
                     version: "< 730",
                  },
                  {
                     status: "affected",
                     version: "< 731",
                  },
                  {
                     status: "affected",
                     version: "< 740",
                  },
                  {
                     status: "affected",
                     version: "< 750",
                  },
                  {
                     status: "affected",
                     version: "< 751",
                  },
                  {
                     status: "affected",
                     version: "< 752",
                  },
                  {
                     status: "affected",
                     version: "< 753",
                  },
                  {
                     status: "affected",
                     version: "< 754",
                  },
                  {
                     status: "affected",
                     version: "< 755",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A Remote Code Execution vulnerability exists in the SAP NetWeaver (ABAP Server, up to release 7.40) and ABAP Platform (> release 7.40).Because of this, an attacker can exploit these products via Code Injection, and potentially enabling to take complete control of the products, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the products to terminate.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.1,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Code Injection",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2022-05-19T17:06:19",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2958563",
            },
            {
               name: "20220518 SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP Application Server, ABAP and ABAP Platform (Different Software Components)",
               tags: [
                  "mailing-list",
                  "x_refsource_FULLDISC",
               ],
               url: "http://seclists.org/fulldisclosure/2022/May/42",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2020-6318",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP NetWeaver (ABAP Server) and ABAP Platform",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "700",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "701",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "702",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "710",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "711",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "730",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "731",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "740",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "750",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "751",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "752",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "753",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "754",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "755",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "A Remote Code Execution vulnerability exists in the SAP NetWeaver (ABAP Server, up to release 7.40) and ABAP Platform (> release 7.40).Because of this, an attacker can exploit these products via Code Injection, and potentially enabling to take complete control of the products, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the products to terminate.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "9.1",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Code Injection",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2958563",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2958563",
                  },
                  {
                     name: "20220518 SEC Consult SA-20220518-0 :: Multiple Critical Vulnerabilities in SAP Application Server, ABAP and ABAP Platform (Different Software Components)",
                     refsource: "FULLDISC",
                     url: "http://seclists.org/fulldisclosure/2022/May/42",
                  },
                  {
                     name: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
                     refsource: "MISC",
                     url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2020-6318",
      datePublished: "2020-09-09T12:46:21",
      dateReserved: "2020-01-08T00:00:00",
      dateUpdated: "2024-08-04T08:55:22.456Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

Vulnerability from fkie_nvd
Published
2023-03-14 05:15
Modified
2024-11-21 07:49
Summary
Due to insufficient input sanitization, SAP ABAP - versions 751, 753, 753, 754, 756, 757, 791, allows an authenticated high privileged user to alter the current session of the user by injecting the malicious database queries over the network and gain access to the unintended data. This may lead to a high impact on the confidentiality and no impact on the availability and integrity of the application.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:751:*:*:*:*:*:*:*",
                     matchCriteriaId: "65320F25-669B-40D8-A246-07B0202C00A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:753:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1C86F45-445E-4970-A378-199A35B23F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:754:*:*:*:*:*:*:*",
                     matchCriteriaId: "74901A8A-A556-478F-ABCD-7DCFD471210A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:756:*:*:*:*:*:*:*",
                     matchCriteriaId: "623B6391-B1E3-4C2A-93C9-AB264377BACB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:757:*:*:*:*:*:*:*",
                     matchCriteriaId: "1A11684D-9F45-4EE6-92B4-55050A0D8715",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:791:*:*:*:*:*:*:*",
                     matchCriteriaId: "1D006CEB-0A2F-4D25-804F-4EB78C317ECF",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Due to insufficient input sanitization, SAP ABAP - versions 751, 753, 753, 754, 756, 757, 791, allows an authenticated high privileged user to alter the current session of the user by injecting the malicious database queries over the network and gain access to the unintended data. This may lead to a high impact on the confidentiality and no impact on the availability and integrity of the application.\n\n",
      },
   ],
   id: "CVE-2023-25615",
   lastModified: "2024-11-21T07:49:50.117",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 4,
            source: "cna@sap.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.9,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "HIGH",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 3.6,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-03-14T05:15:29.673",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/3289844",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/3289844",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "cna@sap.com",
         type: "Primary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-89",
            },
         ],
         source: "nvd@nist.gov",
         type: "Secondary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-08-12 14:15
Modified
2024-11-21 05:35
Summary
Improper access control in SOA Configuration Trace component in SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 702, 730, 731, 740, 750, allows any authenticated user to enumerate all SAP users, leading to Information Disclosure.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:7.31:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E7672B-1021-4592-AA5F-2B51B63627BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:7.40:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB22F97-3C28-4AA0-8BA2-84559AB56279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:7.50:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7AAA98F-50DD-4752-8D42-1E7B5B93BDB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:700:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AA5D36E-BE80-422B-8A6B-0ABDDE274146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:701:*:*:*:*:*:*:*",
                     matchCriteriaId: "C04D8608-83F0-4D7F-A7A9-59B616240F14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:702:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4DF5956-1396-41FA-B101-E24F7898D135",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:710:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE0E878-BE4E-4CFD-907D-7ABB745A4CE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:711:*:*:*:*:*:*:*",
                     matchCriteriaId: "D14E8DCD-B365-4FC0-B08C-1A89787111C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:751:*:*:*:*:*:*:*",
                     matchCriteriaId: "65320F25-669B-40D8-A246-07B0202C00A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:753:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1C86F45-445E-4970-A378-199A35B23F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:755:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B48E0FF-814F-4F9C-B5B1-87D978E1B4A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:700:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5A3C915-0E5F-4B1A-B1EB-5ADEA517F620",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:701:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B2522A-B850-4EC2-B2F2-5EBF36801B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:702:*:*:*:*:*:*:*",
                     matchCriteriaId: "706FEB9E-3EE9-405E-A8C9-733DAF68AC6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:710:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B5BF1EC-C2A6-486B-8E63-0A7ED431C1F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:711:*:*:*:*:*:*:*",
                     matchCriteriaId: "17847B21-8BE6-4359-913B-B6592D37C655",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CC29738-CF17-4E6B-9C9E-879B17F7E001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*",
                     matchCriteriaId: "127E508F-6CC1-41C8-96DF-8D14FFDD4020",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "7777AA80-1608-420E-B7D5-09ABECD51728",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*",
                     matchCriteriaId: "0539618A-1C4D-463F-B2BB-DD1C239C23EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9F38585-73AE-4DBB-A978-F0272DF8FB58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B8D3EA0-28E6-4333-8C67-B9D3775EB9BC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Improper access control in SOA Configuration Trace component in SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 702, 730, 731, 740, 750, allows any authenticated user to enumerate all SAP users, leading to Information Disclosure.",
      },
      {
         lang: "es",
         value: "Un control de acceso inapropiado en el componente SOA Configuration Trace en SAP NetWeaver (ABAP Server) y la plataforma ABAP, versiones - 702, 730, 731, 740, 750, permite a cualquier usuario autenticado enumerar todos los usuarios de SAP, conllevando a una Divulgación de Información",
      },
   ],
   id: "CVE-2020-6310",
   lastModified: "2024-11-21T05:35:29.030",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "cna@sap.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-08-12T14:15:14.767",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2944988",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2944988",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-07-14 13:15
Modified
2024-11-21 05:35
Summary
SAP NetWeaver (ABAP Server) and ABAP Platform, versions 731, 740, 750, allows an attacker with admin privileges to access certain files which should otherwise be restricted, leading to Information Disclosure.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:7.31:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E7672B-1021-4592-AA5F-2B51B63627BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:7.40:*:*:*:*:*:*:*",
                     matchCriteriaId: "4AB22F97-3C28-4AA0-8BA2-84559AB56279",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:7.50:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7AAA98F-50DD-4752-8D42-1E7B5B93BDB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CC29738-CF17-4E6B-9C9E-879B17F7E001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*",
                     matchCriteriaId: "127E508F-6CC1-41C8-96DF-8D14FFDD4020",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "7777AA80-1608-420E-B7D5-09ABECD51728",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "SAP NetWeaver (ABAP Server) and ABAP Platform, versions 731, 740, 750, allows an attacker with admin privileges to access certain files which should otherwise be restricted, leading to Information Disclosure.",
      },
      {
         lang: "es",
         value: "SAP NetWeaver (ABAP Server) y ABAP Platform, versiones 731, 740, 750, permiten a un atacante con privilegios de administrador acceder a determinados archivos que de otro modo deberían estar restringidos, conllevando a una Divulgación de Información",
      },
   ],
   id: "CVE-2020-6280",
   lastModified: "2024-11-21T05:35:25.693",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 2.7,
               baseSeverity: "LOW",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 1.2,
            impactScore: 1.4,
            source: "cna@sap.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 2.7,
               baseSeverity: "LOW",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-07-14T13:15:12.610",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
            "Vendor Advisory",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2927373",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
            "Vendor Advisory",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2927373",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-02-12 20:15
Modified
2024-11-21 05:35
Summary
Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.
Impacted products
Vendor Product Version
sap abap_platform 7.50
sap abap_platform 7.51
sap abap_platform 7.52
sap abap_platform 7.53
sap abap_platform 7.54
sap netweaver 7.02
sap netweaver 7.30
sap netweaver 7.31
sap netweaver 7.40



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:7.50:*:*:*:*:*:*:*",
                     matchCriteriaId: "A7AAA98F-50DD-4752-8D42-1E7B5B93BDB1",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:7.51:*:*:*:*:*:*:*",
                     matchCriteriaId: "1F7FC59C-72BB-4977-9003-DE65F9BE3361",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:7.52:*:*:*:*:*:*:*",
                     matchCriteriaId: "143EB1D2-F62A-4223-9D3A-0CCBF75FEF2D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:7.53:*:*:*:*:*:*:*",
                     matchCriteriaId: "688AE1F8-1A9D-4B2E-91DE-1E0010BE9DD9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:7.54:*:*:*:*:*:*:*",
                     matchCriteriaId: "A643D231-9256-4325-9706-662EF80D0531",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver:7.02:*:*:*:*:*:*:*",
                     matchCriteriaId: "A9805246-77E5-456C-B7CF-07CFF2F9F069",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver:7.30:*:*:*:*:*:*:*",
                     matchCriteriaId: "606EFE4F-57A4-44E2-A98D-F0867A658218",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver:7.31:*:*:*:*:*:*:*",
                     matchCriteriaId: "FECD5E96-7669-4747-80D2-27F95BF420BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver:7.40:*:*:*:*:*:*:*",
                     matchCriteriaId: "F019F7F5-7740-4BD4-850F-D7A1923C6200",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Under some circumstances the SAML SSO implementation in the SAP NetWeaver (SAP_BASIS versions 702, 730, 731, 740 and SAP ABAP Platform (SAP_BASIS versions 750, 751, 752, 753, 754), allows an attacker to include invalidated data in the HTTP response header sent to a Web user, leading to HTTP Response Splitting vulnerability.",
      },
      {
         lang: "es",
         value: "En algunas circunstancias, la implementación de SSO SAML en SAP NetWeaver (SAP_BASIS versiones 702, 730, 731, 740 y SAP ABAP Platform (SAP_BASIS versiones 750, 751, 752, 753, 754), permite a un atacante incluir datos invalidados en encabezado de respuesta HTTP enviado a un usuario Web,  conllevando a una vulnerabilidad de División de Respuesta HTTP.",
      },
   ],
   id: "CVE-2020-6181",
   lastModified: "2024-11-21T05:35:15.167",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "NONE",
               baseScore: 5,
               confidentialityImpact: "NONE",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:N/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "cna@sap.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.8,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-12T20:15:13.777",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
            "Vendor Advisory",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2880744",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
            "Vendor Advisory",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2880744",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-Other",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-08-12 14:15
Modified
2024-11-21 05:35
Summary
SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753, 755, allows an attacker to inject code that can be executed by the application, leading to Code Injection. An attacker could thereby control the behavior of the application.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:7.31:*:*:*:*:*:*:*",
                     matchCriteriaId: "D7E7672B-1021-4592-AA5F-2B51B63627BA",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:700:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AA5D36E-BE80-422B-8A6B-0ABDDE274146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:701:*:*:*:*:*:*:*",
                     matchCriteriaId: "C04D8608-83F0-4D7F-A7A9-59B616240F14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:702:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4DF5956-1396-41FA-B101-E24F7898D135",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:710:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE0E878-BE4E-4CFD-907D-7ABB745A4CE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:711:*:*:*:*:*:*:*",
                     matchCriteriaId: "D14E8DCD-B365-4FC0-B08C-1A89787111C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:740:*:*:*:*:*:*:*",
                     matchCriteriaId: "07710B18-BF01-4316-A258-4F1CB6269C5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3A631DA-1279-49AC-922E-7D7216DACC8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:751:*:*:*:*:*:*:*",
                     matchCriteriaId: "65320F25-669B-40D8-A246-07B0202C00A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:753:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1C86F45-445E-4970-A378-199A35B23F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:755:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B48E0FF-814F-4F9C-B5B1-87D978E1B4A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:700:*:*:*:*:*:*:*",
                     matchCriteriaId: "C5A3C915-0E5F-4B1A-B1EB-5ADEA517F620",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:701:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B2522A-B850-4EC2-B2F2-5EBF36801B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:702:*:*:*:*:*:*:*",
                     matchCriteriaId: "706FEB9E-3EE9-405E-A8C9-733DAF68AC6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:710:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B5BF1EC-C2A6-486B-8E63-0A7ED431C1F0",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:711:*:*:*:*:*:*:*",
                     matchCriteriaId: "17847B21-8BE6-4359-913B-B6592D37C655",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*",
                     matchCriteriaId: "5CC29738-CF17-4E6B-9C9E-879B17F7E001",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*",
                     matchCriteriaId: "127E508F-6CC1-41C8-96DF-8D14FFDD4020",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "7777AA80-1608-420E-B7D5-09ABECD51728",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*",
                     matchCriteriaId: "0539618A-1C4D-463F-B2BB-DD1C239C23EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9F38585-73AE-4DBB-A978-F0272DF8FB58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B8D3EA0-28E6-4333-8C67-B9D3775EB9BC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753, 755, allows an attacker to inject code that can be executed by the application, leading to Code Injection. An attacker could thereby control the behavior of the application.",
      },
      {
         lang: "es",
         value: "SAP NetWeaver (ABAP Server) y plataforma ABAP, versiones: 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753, 755, permiten a un atacante inyectar código que puede ser ejecutado por la aplicación conllevando a una Inyección de Código. Un atacante podría de ese modo, controlar el comportamiento de la aplicación",
      },
   ],
   id: "CVE-2020-6296",
   lastModified: "2024-11-21T05:35:27.473",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.3,
               baseSeverity: "HIGH",
               confidentialityImpact: "LOW",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.5,
            source: "cna@sap.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-08-12T14:15:14.207",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2941667",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2941667",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-02-13 03:15
Modified
2024-11-21 08:55
Summary
In SAP ABA (Application Basis) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I, an attacker authenticated as a user with a remote execution authorization can use a vulnerable interface. This allows the attacker to use the interface to invoke an application function to perform actions which they would not normally be permitted to perform.  Depending on the function executed, the attack can read or modify any user/business data and can make the entire system unavailable.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:75c:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF0145C4-663F-4E0F-B271-515EFB130D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:75i:*:*:*:*:*:*:*",
                     matchCriteriaId: "79B3CC36-624C-46F9-832E-43E831AFFC35",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:700:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AA5D36E-BE80-422B-8A6B-0ABDDE274146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:701:*:*:*:*:*:*:*",
                     matchCriteriaId: "C04D8608-83F0-4D7F-A7A9-59B616240F14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:702:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4DF5956-1396-41FA-B101-E24F7898D135",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:731:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC2B8C19-4A66-44A8-9995-2BB71D8AA665",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:740:*:*:*:*:*:*:*",
                     matchCriteriaId: "07710B18-BF01-4316-A258-4F1CB6269C5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3A631DA-1279-49AC-922E-7D7216DACC8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:751:*:*:*:*:*:*:*",
                     matchCriteriaId: "65320F25-669B-40D8-A246-07B0202C00A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:752:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD5559B1-08ED-4F5C-A61D-0EA13597DBE9",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "In SAP ABA (Application Basis) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I, an attacker authenticated as a user with a remote execution authorization can use a vulnerable interface. This allows the attacker to use the interface to invoke an application function to perform actions which they would not normally be permitted to perform.  Depending on the function executed, the attack can read or modify any user/business data and can make the entire system unavailable.\n\n",
      },
      {
         lang: "es",
         value: "En SAP ABA (Application Basis), versiones 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I, un atacante autenticado como usuario con autorización de ejecución remota puede utilizar una interfaz vulnerable. Esto permite al atacante utilizar la interfaz para invocar una función de la aplicación para realizar acciones que normalmente no se le permitiría realizar. Dependiendo de la función ejecutada, el ataque puede leer o modificar cualquier dato de usuario/empresa y puede hacer que todo el sistema no esté disponible.",
      },
   ],
   id: "CVE-2024-22131",
   lastModified: "2024-11-21T08:55:38.760",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.1,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 6,
            source: "cna@sap.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-02-13T03:15:08.363",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://me.sap.com/notes/3420923",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://me.sap.com/notes/3420923",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-94",
            },
         ],
         source: "cna@sap.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2021-12-14 16:15
Modified
2024-11-21 06:30
Severity ?
Summary
Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:701:*:*:*:*:*:*:*",
                     matchCriteriaId: "C04D8608-83F0-4D7F-A7A9-59B616240F14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:740:*:*:*:*:*:*:*",
                     matchCriteriaId: "07710B18-BF01-4316-A258-4F1CB6269C5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3A631DA-1279-49AC-922E-7D7216DACC8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:751:*:*:*:*:*:*:*",
                     matchCriteriaId: "65320F25-669B-40D8-A246-07B0202C00A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:752:*:*:*:*:*:*:*",
                     matchCriteriaId: "DD5559B1-08ED-4F5C-A61D-0EA13597DBE9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:753:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1C86F45-445E-4970-A378-199A35B23F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:754:*:*:*:*:*:*:*",
                     matchCriteriaId: "74901A8A-A556-478F-ABCD-7DCFD471210A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:755:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B48E0FF-814F-4F9C-B5B1-87D978E1B4A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:756:*:*:*:*:*:*:*",
                     matchCriteriaId: "623B6391-B1E3-4C2A-93C9-AB264377BACB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:804:*:*:*:*:*:*:*",
                     matchCriteriaId: "F31DD4B7-2020-47BD-B1F7-DF5AFD9E635A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:701:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B2522A-B850-4EC2-B2F2-5EBF36801B39",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*",
                     matchCriteriaId: "127E508F-6CC1-41C8-96DF-8D14FFDD4020",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "7777AA80-1608-420E-B7D5-09ABECD51728",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*",
                     matchCriteriaId: "0539618A-1C4D-463F-B2BB-DD1C239C23EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:752:*:*:*:*:*:*:*",
                     matchCriteriaId: "62828DCD-F80E-4C7C-A988-EFEA06A5223E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9F38585-73AE-4DBB-A978-F0272DF8FB58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:*:*:*:*",
                     matchCriteriaId: "D416C064-BB8A-4230-A761-84A93E017F79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B8D3EA0-28E6-4333-8C67-B9D3775EB9BC",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:756:*:*:*:*:*:*:*",
                     matchCriteriaId: "72491771-4492-4902-9F0C-CE6A60BAA705",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:804:*:*:*:*:*:*:*",
                     matchCriteriaId: "2132C1C0-AD61-4C85-BA07-523206815A4D",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Internally used text extraction reports allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.",
      },
      {
         lang: "es",
         value: "Los informes de extracción de texto usados internamente permiten a un atacante inyectar código que puede ser ejecutado por la aplicación. Un atacante podría así controlar el comportamiento de la aplicación",
      },
   ],
   id: "CVE-2021-44231",
   lastModified: "2024-11-21T06:30:38.730",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.8,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2021-12-14T16:15:09.583",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
            "Vendor Advisory",
         ],
         url: "https://launchpad.support.sap.com/#/notes/3119365",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
            "Vendor Advisory",
         ],
         url: "https://launchpad.support.sap.com/#/notes/3119365",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-94",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-11 04:16
Modified
2024-11-21 07:56
Summary
The SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:75c:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF0145C4-663F-4E0F-B271-515EFB130D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:75d:*:*:*:*:*:*:*",
                     matchCriteriaId: "5406CCCC-4E8D-42A8-BFD9-771401C5DDE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:75e:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4E59595-19DE-419C-8BBC-058332762E9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:application_interface_framework:aif_703:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F2DF820-BD94-4DD5-8749-2890F3EFBF69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:application_interface_framework:aifx_702:*:*:*:*:*:*:*",
                     matchCriteriaId: "843B1EB2-F292-40D0-AD04-591EA3FF7103",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:basis:755:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B5F69B-F93F-47F2-BCB7-4BEDED40E11D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:basis:756:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B92D5C1-F724-4551-8365-0BBCE0956306",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s4core:100:*:*:*:*:*:*:*",
                     matchCriteriaId: "3A444336-BCF2-4F87-B24E-F93E2801EE89",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s4core:101:*:*:*:*:*:*:*",
                     matchCriteriaId: "1045AD04-714D-4CC7-8153-6E3C00172A0C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.\n\n",
      },
   ],
   id: "CVE-2023-29110",
   lastModified: "2024-11-21T07:56:34.107",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 3.7,
               baseSeverity: "LOW",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 2.5,
            source: "cna@sap.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.3,
            impactScore: 2.7,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-04-11T04:16:07.663",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/3113349",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/3113349",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-80",
            },
         ],
         source: "cna@sap.com",
         type: "Secondary",
      },
      {
         description: [
            {
               lang: "en",
               value: "CWE-79",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-08-12 14:15
Modified
2024-11-21 05:35
Summary
SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 740, 750, 751, 752, 753, 754, 755, allows a business user to access the list of users in the given system using value help, leading to Information Disclosure.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:740:*:*:*:*:*:*:*",
                     matchCriteriaId: "07710B18-BF01-4316-A258-4F1CB6269C5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3A631DA-1279-49AC-922E-7D7216DACC8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:751:*:*:*:*:*:*:*",
                     matchCriteriaId: "65320F25-669B-40D8-A246-07B0202C00A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:753:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1C86F45-445E-4970-A378-199A35B23F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:754:*:*:*:*:*:*:*",
                     matchCriteriaId: "74901A8A-A556-478F-ABCD-7DCFD471210A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:755:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B48E0FF-814F-4F9C-B5B1-87D978E1B4A4",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*",
                     matchCriteriaId: "127E508F-6CC1-41C8-96DF-8D14FFDD4020",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "7777AA80-1608-420E-B7D5-09ABECD51728",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*",
                     matchCriteriaId: "0539618A-1C4D-463F-B2BB-DD1C239C23EB",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*",
                     matchCriteriaId: "D9F38585-73AE-4DBB-A978-F0272DF8FB58",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:*:*:*:*",
                     matchCriteriaId: "D416C064-BB8A-4230-A761-84A93E017F79",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*",
                     matchCriteriaId: "6B8D3EA0-28E6-4333-8C67-B9D3775EB9BC",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "SAP NetWeaver (ABAP Server) and ABAP Platform, versions - 740, 750, 751, 752, 753, 754, 755, allows a business user to access the list of users in the given system using value help, leading to Information Disclosure.",
      },
      {
         lang: "es",
         value: "SAP NetWeaver (ABAP Server) y la plataforma ABAP, versiones - 740, 750, 751, 752, 753, 754, 755, permiten a un usuario empresarial acceder a la lista de usuarios en el sistema dado usando la ayuda de valor, conllevando a una Divulgación de Información",
      },
   ],
   id: "CVE-2020-6299",
   lastModified: "2024-11-21T05:35:27.797",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "cna@sap.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-08-12T14:15:14.423",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2941510",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2941510",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552603345",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "NVD-CWE-noinfo",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2023-04-11 03:15
Modified
2024-11-21 07:56
Summary
The SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.
Impacted products



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:75c:*:*:*:*:*:*:*",
                     matchCriteriaId: "EF0145C4-663F-4E0F-B271-515EFB130D74",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:75d:*:*:*:*:*:*:*",
                     matchCriteriaId: "5406CCCC-4E8D-42A8-BFD9-771401C5DDE7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:75e:*:*:*:*:*:*:*",
                     matchCriteriaId: "B4E59595-19DE-419C-8BBC-058332762E9A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:application_interface_framework:aif_703:*:*:*:*:*:*:*",
                     matchCriteriaId: "3F2DF820-BD94-4DD5-8749-2890F3EFBF69",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:application_interface_framework:aifx_702:*:*:*:*:*:*:*",
                     matchCriteriaId: "843B1EB2-F292-40D0-AD04-591EA3FF7103",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:basis:755:*:*:*:*:*:*:*",
                     matchCriteriaId: "98B5F69B-F93F-47F2-BCB7-4BEDED40E11D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:basis:756:*:*:*:*:*:*:*",
                     matchCriteriaId: "9B92D5C1-F724-4551-8365-0BBCE0956306",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s4core:101:*:*:*:*:*:*:*",
                     matchCriteriaId: "1045AD04-714D-4CC7-8153-6E3C00172A0C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.\n\n",
      },
   ],
   id: "CVE-2023-29109",
   lastModified: "2024-11-21T07:56:33.963",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "HIGH",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "CHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 1.3,
            impactScore: 2.7,
            source: "cna@sap.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.6,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.1,
            impactScore: 2.5,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2023-04-11T03:15:07.927",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/3115598",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/3115598",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-1236",
            },
         ],
         source: "cna@sap.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2024-03-12 01:15
Modified
2025-02-26 16:32
Summary
Due to missing authorization check, attacker with business user account in SAP ABAP Platform - version 758, 795, can change the privacy setting of job templates from shared to private. As a result, the selected template would only be accessible to the owner.
Impacted products
Vendor Product Version
sap abap_platform 758
sap abap_platform 795



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:758:*:*:*:*:*:*:*",
                     matchCriteriaId: "4E7618AC-8AF1-47E2-950E-E7433EAAEF81",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:795:*:*:*:*:*:*:*",
                     matchCriteriaId: "201C8077-3B46-4D5B-B95A-031E148FE2AE",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Due to missing authorization check, attacker with business user account in SAP ABAP Platform - version 758, 795, can change the privacy setting of job templates from shared to private. As a result, the selected template would only be accessible to the owner.\n\n",
      },
      {
         lang: "es",
         value: "Debido a la falta de verificación de autorización, un atacante con cuenta de usuario empresarial en SAP ABAP Platform (versión 758, 795) puede cambiar la configuración de privacidad de las plantillas de trabajo de compartida a privada. Como resultado, solo el propietario podrá acceder a la plantilla seleccionada.",
      },
   ],
   id: "CVE-2024-27900",
   lastModified: "2025-02-26T16:32:47.043",
   metrics: {
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "cna@sap.com",
            type: "Secondary",
         },
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "NONE",
               integrityImpact: "LOW",
               privilegesRequired: "NONE",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 3.9,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2024-03-12T01:15:49.980",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://me.sap.com/notes/3419022",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://me.sap.com/notes/3419022",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Analyzed",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "cna@sap.com",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-09-09 13:15
Modified
2024-11-21 05:35
Summary
A Remote Code Execution vulnerability exists in the SAP NetWeaver (ABAP Server, up to release 7.40) and ABAP Platform (> release 7.40).Because of this, an attacker can exploit these products via Code Injection, and potentially enabling to take complete control of the products, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the products to terminate.



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:700:*:*:*:*:*:*:*",
                     matchCriteriaId: "9AA5D36E-BE80-422B-8A6B-0ABDDE274146",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:701:*:*:*:*:*:*:*",
                     matchCriteriaId: "C04D8608-83F0-4D7F-A7A9-59B616240F14",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:702:*:*:*:*:*:*:*",
                     matchCriteriaId: "E4DF5956-1396-41FA-B101-E24F7898D135",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:710:*:*:*:*:*:*:*",
                     matchCriteriaId: "ADE0E878-BE4E-4CFD-907D-7ABB745A4CE8",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:711:*:*:*:*:*:*:*",
                     matchCriteriaId: "D14E8DCD-B365-4FC0-B08C-1A89787111C9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:730:*:*:*:*:*:*:*",
                     matchCriteriaId: "47631DD2-0504-449D-9460-4D4233EAAEF3",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:731:*:*:*:*:*:*:*",
                     matchCriteriaId: "CC2B8C19-4A66-44A8-9995-2BB71D8AA665",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:740:*:*:*:*:*:*:*",
                     matchCriteriaId: "07710B18-BF01-4316-A258-4F1CB6269C5E",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:750:*:*:*:*:*:*:*",
                     matchCriteriaId: "A3A631DA-1279-49AC-922E-7D7216DACC8D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:751:*:*:*:*:*:*:*",
                     matchCriteriaId: "65320F25-669B-40D8-A246-07B0202C00A9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:753:*:*:*:*:*:*:*",
                     matchCriteriaId: "E1C86F45-445E-4970-A378-199A35B23F4B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:754:*:*:*:*:*:*:*",
                     matchCriteriaId: "74901A8A-A556-478F-ABCD-7DCFD471210A",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:abap_platform:755:*:*:*:*:*:*:*",
                     matchCriteriaId: "5B48E0FF-814F-4F9C-B5B1-87D978E1B4A4",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "A Remote Code Execution vulnerability exists in the SAP NetWeaver (ABAP Server, up to release 7.40) and ABAP Platform (> release 7.40).Because of this, an attacker can exploit these products via Code Injection, and potentially enabling to take complete control of the products, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the products to terminate.",
      },
      {
         lang: "es",
         value: "Se presenta una vulnerabilidad de ejecución de código remota en SAP NetWeaver (servidor ABAP, versiones hasta 7.40) y la Plataforma ABAP (versiones posteriores a 7.40). Debido a esto, un atacante puede explotar estos productos por medio de una Inyección de Código y potencialmente permitir tomar el control completo de los productos, incluyendo la visualización, el cambio o la eliminación de datos mediante la inyección de código en la memoria de trabajo que es posteriormente ejecutada por la aplicación.&#xa0;También puede ser usada para causar un fallo general en el producto, causando que los productos finalicen.",
      },
   ],
   id: "CVE-2020-6318",
   lastModified: "2024-11-21T05:35:29.977",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 9.1,
               baseSeverity: "CRITICAL",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "CHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
               version: "3.0",
            },
            exploitabilityScore: 2.3,
            impactScore: 6,
            source: "cna@sap.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 7.2,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "HIGH",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 1.2,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-09-09T13:15:12.020",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2022/May/42",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2958563",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Third Party Advisory",
            "VDB Entry",
         ],
         url: "http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Exploit",
            "Mailing List",
            "Third Party Advisory",
         ],
         url: "http://seclists.org/fulldisclosure/2022/May/42",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2958563",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-94",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}