Vulnerabilites related to sap - erp
Vulnerability from fkie_nvd
Published
2020-02-12 20:15
Modified
2024-11-21 05:35
Summary
VAT Pro-Rata reports in SAP ERP (SAP_APPL versions 600, 602, 603, 604, 605, 606, 616 and SAP_FIN versions 617, 618, 700, 720, 730) and SAP S/4 HANA (versions 100, 101, 102, 103, 104) do not perform necessary authorization checks for an authenticated user leading to Missing Authorization Check.
Impacted products
Vendor Product Version
sap erp 6.0
sap s\/4_hana 1511
sap s\/4_hana 1610
sap s\/4_hana 1709
sap s\/4_hana 1809
sap s\/4_hana 1909



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:erp:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "567E715A-39D9-4524-A60B-0A919A460D7D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4_hana:1511:*:*:*:*:*:*:*",
                     matchCriteriaId: "02BC74F5-5560-4459-B712-5834DEB85B45",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4_hana:1610:*:*:*:*:*:*:*",
                     matchCriteriaId: "7CDC5426-D2C1-430A-96AF-F25CE04A01A7",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4_hana:1709:*:*:*:*:*:*:*",
                     matchCriteriaId: "D2F4BB0A-56DD-4A82-AB66-46C67A261287",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4_hana:1809:*:*:*:*:*:*:*",
                     matchCriteriaId: "EB6E0D66-B1DF-4E65-9155-07C687C08046",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4_hana:1909:*:*:*:*:*:*:*",
                     matchCriteriaId: "055B76F2-6B9F-475F-8244-E427DCB6B0F2",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "VAT Pro-Rata reports in SAP ERP (SAP_APPL versions 600, 602, 603, 604, 605, 606, 616 and SAP_FIN versions 617, 618, 700, 720, 730) and SAP S/4 HANA (versions 100, 101, 102, 103, 104) do not perform necessary authorization checks for an authenticated user leading to Missing Authorization Check.",
      },
      {
         lang: "es",
         value: "Los reportes de VAT Pro-Rata en SAP ERP (SAP_APPL versiones 600, 602, 603, 604, 605, 606, 616 y SAP_FIN versiones 617, 618, 700, 720, 730) y SAP S/4 HANA (versiones 100, 101, 102 , 103, 104), no realizan las comprobaciones de autorización necesarias para un usuario autenticado, conllevando a una Falta de Comprobación de Autorización.",
      },
   ],
   id: "CVE-2020-6188",
   lastModified: "2024-11-21T05:35:15.857",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "PARTIAL",
               baseScore: 6.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 6.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "REQUIRED",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.1,
            impactScore: 4.2,
            source: "cna@sap.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "HIGH",
               baseScore: 8.8,
               baseSeverity: "HIGH",
               confidentialityImpact: "HIGH",
               integrityImpact: "HIGH",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 5.9,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-02-12T20:15:14.400",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
            "Vendor Advisory",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2857511",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
            "Vendor Advisory",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2857511",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-03-10 21:15
Modified
2024-11-21 05:35
Summary
The view FIMENAV_COMPCERT in SAP ERP (MENA Certificate Management), EAPPGLO version 607, SAP_FIN versions- 618, 730 and SAP S/4HANA (MENA Certificate Management), S4CORE versions- 100, 101, 102, 103, 104; does not have any authorization check to it due to which an attacker without an authorization group can maintain any company certificate, leading to Missing Authorization Check.
Impacted products
Vendor Product Version
sap erp 607



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:erp:607:*:*:*:*:*:*:*",
                     matchCriteriaId: "56B0EE10-D5C3-4BA8-A2D5-3BE53F890F0C",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The view FIMENAV_COMPCERT in SAP ERP (MENA Certificate Management), EAPPGLO version 607, SAP_FIN versions- 618, 730 and SAP S/4HANA (MENA Certificate Management), S4CORE versions- 100, 101, 102, 103, 104; does not have any authorization check to it due to which an attacker without an authorization group can maintain any company certificate, leading to Missing Authorization Check.",
      },
      {
         lang: "es",
         value: "La vista FIMENAV_COMPCERT en SAP ERP (MENA Certificate Management), EAPPGLO versión 607, SAP_FIN versiones 618, 730 y SAP S/4HANA (MENA Certificate Management), S4CORE versiones 100, 101, 102, 103, 104; no tiene ninguna comprobación de autorización debido a que un atacante sin un grupo de autorización puede mantener cualquier certificado de la compañía, conllevando a una Falta de Comprobación de Autorización.",
      },
   ],
   id: "CVE-2020-6199",
   lastModified: "2024-11-21T05:35:17.053",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.5,
            source: "cna@sap.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.5,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-03-10T21:15:14.043",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2871167",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2871167",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2014-04-10 20:55
Modified
2025-04-12 10:46
Severity ?
Summary
The Security Audit Log facility in SAP Enhancement Package (EHP) 6 for SAP ERP 6.0 allows remote attackers to modify or delete arbitrary log classes via unspecified vectors. NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
sap enhancement_package 6.0
sap erp 6.0



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:enhancement_package:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "47E30A94-4CD3-40ED-A08A-5810DB5691A5",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:erp:6.0:*:*:*:*:*:*:*",
                     matchCriteriaId: "567E715A-39D9-4524-A60B-0A919A460D7D",
                     vulnerable: false,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
         operator: "AND",
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "The Security Audit Log facility in SAP Enhancement Package (EHP) 6 for SAP ERP 6.0 allows remote attackers to modify or delete arbitrary log classes via unspecified vectors.  NOTE: some of these details are obtained from third party information.",
      },
      {
         lang: "es",
         value: "La funcionalidad de registro de auditoría de seguridad en SAP Enhancement Package (EHP) 6 para SAP ERP 6.0 permite a atacantes remotos modificar o eliminar clases de registro arbitrarias a través de vectores no especificados.  NOTA: algunos de estos detalles se obtienen de información de terceras partes.",
      },
   ],
   id: "CVE-2014-2748",
   lastModified: "2025-04-12T10:46:40.837",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "HIGH",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "NONE",
               availabilityImpact: "PARTIAL",
               baseScore: 7.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P",
               version: "2.0",
            },
            exploitabilityScore: 10,
            impactScore: 6.4,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
   },
   published: "2014-04-10T20:55:06.307",
   references: [
      {
         source: "cve@mitre.org",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/57741",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.onapsis.com/get.php?resid=adv_onapsis-2014-002",
      },
      {
         source: "cve@mitre.org",
         url: "http://www.onapsis.com/research-advisories.php",
      },
      {
         source: "cve@mitre.org",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/92334",
      },
      {
         source: "cve@mitre.org",
         url: "https://service.sap.com/sap/support/notes/1926485",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "http://secunia.com/advisories/57741",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.onapsis.com/get.php?resid=adv_onapsis-2014-002",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "http://www.onapsis.com/research-advisories.php",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/92334",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         url: "https://service.sap.com/sap/support/notes/1926485",
      },
   ],
   sourceIdentifier: "cve@mitre.org",
   vulnStatus: "Deferred",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-264",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-11-10 17:15
Modified
2024-11-21 05:35
Summary
SAP ERP and SAP S/4 HANA allows an authenticated user to see cost records to objects to which he has no authorization in PS reporting, leading to Missing Authorization check.
Impacted products
Vendor Product Version
sap erp 600
sap erp 602
sap erp 603
sap erp 604
sap erp 605
sap erp 606
sap erp 616
sap erp 617
sap erp 618
sap s\/4hana 100
sap s\/4hana 101
sap s\/4hana 102
sap s\/4hana 103
sap s\/4hana 104



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:erp:600:*:*:*:*:*:*:*",
                     matchCriteriaId: "9E53BFD1-8B0D-4BAD-ABA8-24C4FB25036F",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:erp:602:*:*:*:*:*:*:*",
                     matchCriteriaId: "973DF1B4-A0F9-4D7C-9367-BA3380F9E426",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:erp:603:*:*:*:*:*:*:*",
                     matchCriteriaId: "E560E999-5E5E-4EC2-87A7-DF52F3E1BD3D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:erp:604:*:*:*:*:*:*:*",
                     matchCriteriaId: "E9E38906-8B63-4E06-8BF3-EDC5BFF0BAF9",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:erp:605:*:*:*:*:*:*:*",
                     matchCriteriaId: "7C4FD4F9-A427-44EC-A266-B7BD9C4C7D63",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:erp:606:*:*:*:*:*:*:*",
                     matchCriteriaId: "0107AAA9-C29D-4447-847A-B1825C947D8B",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:erp:616:*:*:*:*:*:*:*",
                     matchCriteriaId: "6327AA0C-A8EF-47BC-BD27-B7835EC26AC5",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:erp:617:*:*:*:*:*:*:*",
                     matchCriteriaId: "619506AC-B6AB-4C7B-9A70-3B1753E2C441",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:erp:618:*:*:*:*:*:*:*",
                     matchCriteriaId: "4573BD22-D50B-431E-928A-C495E342D1AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4hana:100:*:*:*:*:*:*:*",
                     matchCriteriaId: "11051D6A-FC81-4951-ACDA-BB07D5A5D751",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4hana:101:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6FE144C-BAF2-4E45-93EE-D70764BDEFD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4hana:102:*:*:*:*:*:*:*",
                     matchCriteriaId: "55BACB30-A607-410E-AB05-E991CC19CE12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4hana:103:*:*:*:*:*:*:*",
                     matchCriteriaId: "95A0C742-4CBD-46B8-B2B3-5949EFC82A6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4hana:104:*:*:*:*:*:*:*",
                     matchCriteriaId: "14A540DA-F234-4EEA-ADE8-4F6306A86C1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "SAP ERP and SAP S/4 HANA allows an authenticated user to see cost records to objects to which he has no authorization in PS reporting, leading to Missing Authorization check.",
      },
      {
         lang: "es",
         value: "SAP ERP y SAP S/4 HANA, permiten a un usuario autenticado visualizar los registros de costos de objetos para los que no cuenta con autorización en los reportes de PS, conllevando a una Falta de Comprobación de Autorización",
      },
   ],
   id: "CVE-2020-6316",
   lastModified: "2024-11-21T05:35:29.747",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 4,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "NONE",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:N/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 2.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "cna@sap.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 4.3,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "NONE",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 1.4,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-11-10T17:15:15.233",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2944188",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2944188",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

Vulnerability from fkie_nvd
Published
2020-04-24 23:15
Modified
2024-11-21 05:35
Summary
Egypt localized withholding tax reports Clearing of Liabilities and Remittance Statement and Summary in SAP ERP (versions 618, 730, EAPPLGLO 607) and S/4 HANA (versions 100, 101, 102, 103, 104) do not perform necessary authorization checks for an authenticated user, allowing reading or modification of some tax reports, due to Missing Authorization Check.
Impacted products
Vendor Product Version
sap erp 607
sap erp 618
sap erp 730
sap s\/4hana 100
sap s\/4hana 101
sap s\/4hana 102
sap s\/4hana 103
sap s\/4hana 104



{
   configurations: [
      {
         nodes: [
            {
               cpeMatch: [
                  {
                     criteria: "cpe:2.3:a:sap:erp:607:*:*:*:*:*:*:*",
                     matchCriteriaId: "56B0EE10-D5C3-4BA8-A2D5-3BE53F890F0C",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:erp:618:*:*:*:*:*:*:*",
                     matchCriteriaId: "4573BD22-D50B-431E-928A-C495E342D1AE",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:erp:730:*:*:*:*:*:*:*",
                     matchCriteriaId: "2EBA7545-3DC3-45A7-8DF4-35F863C3B985",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4hana:100:*:*:*:*:*:*:*",
                     matchCriteriaId: "11051D6A-FC81-4951-ACDA-BB07D5A5D751",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4hana:101:*:*:*:*:*:*:*",
                     matchCriteriaId: "E6FE144C-BAF2-4E45-93EE-D70764BDEFD6",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4hana:102:*:*:*:*:*:*:*",
                     matchCriteriaId: "55BACB30-A607-410E-AB05-E991CC19CE12",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4hana:103:*:*:*:*:*:*:*",
                     matchCriteriaId: "95A0C742-4CBD-46B8-B2B3-5949EFC82A6D",
                     vulnerable: true,
                  },
                  {
                     criteria: "cpe:2.3:a:sap:s\\/4hana:104:*:*:*:*:*:*:*",
                     matchCriteriaId: "14A540DA-F234-4EEA-ADE8-4F6306A86C1E",
                     vulnerable: true,
                  },
               ],
               negate: false,
               operator: "OR",
            },
         ],
      },
   ],
   cveTags: [],
   descriptions: [
      {
         lang: "en",
         value: "Egypt localized withholding tax reports Clearing of Liabilities and Remittance Statement and Summary in SAP ERP (versions 618, 730, EAPPLGLO 607) and S/4 HANA (versions 100, 101, 102, 103, 104) do not perform necessary authorization checks for an authenticated user, allowing reading or modification of some tax reports, due to Missing Authorization Check.",
      },
      {
         lang: "es",
         value: "Los reportes Clearing of Liabilities and Remittance Statement and Summary de retención de impuestos ubicados en Egypt en SAP ERP (versiones 618, 730, EAPPLGLO 607) y S / 4 HANA (versiones 100, 101, 102, 103, 104) no realizan las comprobaciones de autorización necesarias para un usuario autenticado, lo que permite la lectura o modificación de algunos reportes fiscales, debido a la Falta de Comprobación de Autorización.",
      },
   ],
   id: "CVE-2020-6212",
   lastModified: "2024-11-21T05:35:18.607",
   metrics: {
      cvssMetricV2: [
         {
            acInsufInfo: false,
            baseSeverity: "MEDIUM",
            cvssData: {
               accessComplexity: "LOW",
               accessVector: "NETWORK",
               authentication: "SINGLE",
               availabilityImpact: "NONE",
               baseScore: 5.5,
               confidentialityImpact: "PARTIAL",
               integrityImpact: "PARTIAL",
               vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:N",
               version: "2.0",
            },
            exploitabilityScore: 8,
            impactScore: 4.9,
            obtainAllPrivilege: false,
            obtainOtherPrivilege: false,
            obtainUserPrivilege: false,
            source: "nvd@nist.gov",
            type: "Primary",
            userInteractionRequired: false,
         },
      ],
      cvssMetricV30: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
               version: "3.0",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.5,
            source: "cna@sap.com",
            type: "Secondary",
         },
      ],
      cvssMetricV31: [
         {
            cvssData: {
               attackComplexity: "LOW",
               attackVector: "NETWORK",
               availabilityImpact: "NONE",
               baseScore: 5.4,
               baseSeverity: "MEDIUM",
               confidentialityImpact: "LOW",
               integrityImpact: "LOW",
               privilegesRequired: "LOW",
               scope: "UNCHANGED",
               userInteraction: "NONE",
               vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
               version: "3.1",
            },
            exploitabilityScore: 2.8,
            impactScore: 2.5,
            source: "nvd@nist.gov",
            type: "Primary",
         },
      ],
   },
   published: "2020-04-24T23:15:11.670",
   references: [
      {
         source: "cna@sap.com",
         tags: [
            "Permissions Required",
            "Vendor Advisory",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2864966",
      },
      {
         source: "cna@sap.com",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=544214202",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Permissions Required",
            "Vendor Advisory",
         ],
         url: "https://launchpad.support.sap.com/#/notes/2864966",
      },
      {
         source: "af854a3a-2127-422b-91ae-364da2661108",
         tags: [
            "Vendor Advisory",
         ],
         url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=544214202",
      },
   ],
   sourceIdentifier: "cna@sap.com",
   vulnStatus: "Modified",
   weaknesses: [
      {
         description: [
            {
               lang: "en",
               value: "CWE-862",
            },
         ],
         source: "nvd@nist.gov",
         type: "Primary",
      },
   ],
}

cve-2020-6188
Vulnerability from cvelistv5
Published
2020-02-12 19:46
Modified
2024-08-04 08:55
Summary
VAT Pro-Rata reports in SAP ERP (SAP_APPL versions 600, 602, 603, 604, 605, 606, 616 and SAP_FIN versions 617, 618, 700, 720, 730) and SAP S/4 HANA (versions 100, 101, 102, 103, 104) do not perform necessary authorization checks for an authenticated user leading to Missing Authorization Check.
Impacted products
Vendor Product Version
SAP SE SAP ERP (SAP_APPL) Version: = 6.0
Version: = 6.02
Version: = 6.03
Version: = 6.04
Version: = 6.05
Version: = 6.06
Version: = 6.16
Create a notification for this product.
   SAP SE SAP ERP (SAP_FIN) Version: = 6.17
Version: = 6.18
Version: = 7.0
Version: = 7.20
Version: = 7.30
Create a notification for this product.
   SAP SE SAP S/4 HANA (S4CORE) Version: = 1.0
Version: = 1.01
Version: = 1.02
Version: = 1.03
Version: = 1.04
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:55:22.007Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2857511",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP ERP (SAP_APPL)",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "= 6.0",
                  },
                  {
                     status: "affected",
                     version: "= 6.02",
                  },
                  {
                     status: "affected",
                     version: "= 6.03",
                  },
                  {
                     status: "affected",
                     version: "= 6.04",
                  },
                  {
                     status: "affected",
                     version: "= 6.05",
                  },
                  {
                     status: "affected",
                     version: "= 6.06",
                  },
                  {
                     status: "affected",
                     version: "= 6.16",
                  },
               ],
            },
            {
               product: "SAP ERP (SAP_FIN)",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "= 6.17",
                  },
                  {
                     status: "affected",
                     version: "= 6.18",
                  },
                  {
                     status: "affected",
                     version: "= 7.0",
                  },
                  {
                     status: "affected",
                     version: "= 7.20",
                  },
                  {
                     status: "affected",
                     version: "= 7.30",
                  },
               ],
            },
            {
               product: "SAP S/4 HANA (S4CORE)",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "= 1.0",
                  },
                  {
                     status: "affected",
                     version: "= 1.01",
                  },
                  {
                     status: "affected",
                     version: "= 1.02",
                  },
                  {
                     status: "affected",
                     version: "= 1.03",
                  },
                  {
                     status: "affected",
                     version: "= 1.04",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "VAT Pro-Rata reports in SAP ERP (SAP_APPL versions 600, 602, 603, 604, 605, 606, 616 and SAP_FIN versions 617, 618, 700, 720, 730) and SAP S/4 HANA (versions 100, 101, 102, 103, 104) do not perform necessary authorization checks for an authenticated user leading to Missing Authorization Check.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 6.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Missing Authorization Check",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-02-12T19:46:09",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2857511",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2020-6188",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP ERP (SAP_APPL)",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "=",
                                          version_value: "6.0",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "6.02",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "6.03",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "6.04",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "6.05",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "6.06",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "6.16",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SAP ERP (SAP_FIN)",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "=",
                                          version_value: "6.17",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "6.18",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "7.0",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "7.20",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "7.30",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SAP S/4 HANA (S4CORE)",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "=",
                                          version_value: "1.0",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "1.01",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "1.02",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "1.03",
                                       },
                                       {
                                          version_name: "=",
                                          version_value: "1.04",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "VAT Pro-Rata reports in SAP ERP (SAP_APPL versions 600, 602, 603, 604, 605, 606, 616 and SAP_FIN versions 617, 618, 700, 720, 730) and SAP S/4 HANA (versions 100, 101, 102, 103, 104) do not perform necessary authorization checks for an authenticated user leading to Missing Authorization Check.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "6.3",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Missing Authorization Check",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2857511",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2857511",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2020-6188",
      datePublished: "2020-02-12T19:46:09",
      dateReserved: "2020-01-08T00:00:00",
      dateUpdated: "2024-08-04T08:55:22.007Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-6316
Vulnerability from cvelistv5
Published
2020-11-10 16:11
Modified
2024-08-04 08:55
Summary
SAP ERP and SAP S/4 HANA allows an authenticated user to see cost records to objects to which he has no authorization in PS reporting, leading to Missing Authorization check.
Impacted products
Vendor Product Version
SAP SE SAP ERP Version: < 600
Version: < 602
Version: < 603
Version: < 604
Version: < 605
Version: < 606
Version: < 616
Version: < 617
Version: < 618
Create a notification for this product.
   SAP SE SAP S/4 HANA Version: < 100
Version: < 101
Version: < 102
Version: < 103
Version: < 104
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:55:22.258Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2944188",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP ERP",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 600",
                  },
                  {
                     status: "affected",
                     version: "< 602",
                  },
                  {
                     status: "affected",
                     version: "< 603",
                  },
                  {
                     status: "affected",
                     version: "< 604",
                  },
                  {
                     status: "affected",
                     version: "< 605",
                  },
                  {
                     status: "affected",
                     version: "< 606",
                  },
                  {
                     status: "affected",
                     version: "< 616",
                  },
                  {
                     status: "affected",
                     version: "< 617",
                  },
                  {
                     status: "affected",
                     version: "< 618",
                  },
               ],
            },
            {
               product: "SAP S/4 HANA",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 100",
                  },
                  {
                     status: "affected",
                     version: "< 101",
                  },
                  {
                     status: "affected",
                     version: "< 102",
                  },
                  {
                     status: "affected",
                     version: "< 103",
                  },
                  {
                     status: "affected",
                     version: "< 104",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "SAP ERP and SAP S/4 HANA allows an authenticated user to see cost records to objects to which he has no authorization in PS reporting, leading to Missing Authorization check.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Missing Authorization Check",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-11-10T16:11:29",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2944188",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2020-6316",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP ERP",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "600",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "602",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "603",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "604",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "605",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "606",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "616",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "617",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "618",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SAP S/4 HANA",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "100",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "101",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "102",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "103",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "104",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "SAP ERP and SAP S/4 HANA allows an authenticated user to see cost records to objects to which he has no authorization in PS reporting, leading to Missing Authorization check.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "4.3",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Missing Authorization Check",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2944188",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2944188",
                  },
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2020-6316",
      datePublished: "2020-11-10T16:11:29",
      dateReserved: "2020-01-08T00:00:00",
      dateUpdated: "2024-08-04T08:55:22.258Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-6212
Vulnerability from cvelistv5
Published
2020-04-24 22:18
Modified
2024-08-04 08:55
Summary
Egypt localized withholding tax reports Clearing of Liabilities and Remittance Statement and Summary in SAP ERP (versions 618, 730, EAPPLGLO 607) and S/4 HANA (versions 100, 101, 102, 103, 104) do not perform necessary authorization checks for an authenticated user, allowing reading or modification of some tax reports, due to Missing Authorization Check.
Impacted products
Vendor Product Version
SAP SE SAP ERP Version: < 618
Version: < 730
Version: < EAPPLGLO 607
Create a notification for this product.
   SAP SE SAP S/4 HANA Version: < 100
Version: < 101
Version: < 102
Version: < 103
Version: < 104
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:55:22.053Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=544214202",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2864966",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP ERP",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 618",
                  },
                  {
                     status: "affected",
                     version: "< 730",
                  },
                  {
                     status: "affected",
                     version: "< EAPPLGLO 607",
                  },
               ],
            },
            {
               product: "SAP S/4 HANA",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 100",
                  },
                  {
                     status: "affected",
                     version: "< 101",
                  },
                  {
                     status: "affected",
                     version: "< 102",
                  },
                  {
                     status: "affected",
                     version: "< 103",
                  },
                  {
                     status: "affected",
                     version: "< 104",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "Egypt localized withholding tax reports Clearing of Liabilities and Remittance Statement and Summary in SAP ERP (versions 618, 730, EAPPLGLO 607) and S/4 HANA (versions 100, 101, 102, 103, 104) do not perform necessary authorization checks for an authenticated user, allowing reading or modification of some tax reports, due to Missing Authorization Check.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Missing Authorization Check",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-04-24T22:20:54",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=544214202",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2864966",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2020-6212",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP ERP",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "618",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "730",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "EAPPLGLO 607",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SAP S/4 HANA",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "100",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "101",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "102",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "103",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "104",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Egypt localized withholding tax reports Clearing of Liabilities and Remittance Statement and Summary in SAP ERP (versions 618, 730, EAPPLGLO 607) and S/4 HANA (versions 100, 101, 102, 103, 104) do not perform necessary authorization checks for an authenticated user, allowing reading or modification of some tax reports, due to Missing Authorization Check.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "5.4",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Missing Authorization Check",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=544214202",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=544214202",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2864966",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2864966",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2020-6212",
      datePublished: "2020-04-24T22:18:54",
      dateReserved: "2020-01-08T00:00:00",
      dateUpdated: "2024-08-04T08:55:22.053Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2014-2748
Vulnerability from cvelistv5
Published
2014-04-10 15:00
Modified
2024-08-06 10:21
Severity ?
Summary
The Security Audit Log facility in SAP Enhancement Package (EHP) 6 for SAP ERP 6.0 allows remote attackers to modify or delete arbitrary log classes via unspecified vectors. NOTE: some of these details are obtained from third party information.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-06T10:21:36.111Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.onapsis.com/get.php?resid=adv_onapsis-2014-002",
               },
               {
                  name: "57741",
                  tags: [
                     "third-party-advisory",
                     "x_refsource_SECUNIA",
                     "x_transferred",
                  ],
                  url: "http://secunia.com/advisories/57741",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://service.sap.com/sap/support/notes/1926485",
               },
               {
                  name: "sap-ehp-log-sec-bypass(92334)",
                  tags: [
                     "vdb-entry",
                     "x_refsource_XF",
                     "x_transferred",
                  ],
                  url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/92334",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "http://www.onapsis.com/research-advisories.php",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "n/a",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "n/a",
                  },
               ],
            },
         ],
         datePublic: "2014-03-09T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "The Security Audit Log facility in SAP Enhancement Package (EHP) 6 for SAP ERP 6.0 allows remote attackers to modify or delete arbitrary log classes via unspecified vectors.  NOTE: some of these details are obtained from third party information.",
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "n/a",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2017-08-28T12:57:01",
            orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
            shortName: "mitre",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.onapsis.com/get.php?resid=adv_onapsis-2014-002",
            },
            {
               name: "57741",
               tags: [
                  "third-party-advisory",
                  "x_refsource_SECUNIA",
               ],
               url: "http://secunia.com/advisories/57741",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://service.sap.com/sap/support/notes/1926485",
            },
            {
               name: "sap-ehp-log-sec-bypass(92334)",
               tags: [
                  "vdb-entry",
                  "x_refsource_XF",
               ],
               url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/92334",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "http://www.onapsis.com/research-advisories.php",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cve@mitre.org",
               ID: "CVE-2014-2748",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "n/a",
                                 version: {
                                    version_data: [
                                       {
                                          version_value: "n/a",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "n/a",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The Security Audit Log facility in SAP Enhancement Package (EHP) 6 for SAP ERP 6.0 allows remote attackers to modify or delete arbitrary log classes via unspecified vectors.  NOTE: some of these details are obtained from third party information.",
                  },
               ],
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "n/a",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "http://www.onapsis.com/get.php?resid=adv_onapsis-2014-002",
                     refsource: "MISC",
                     url: "http://www.onapsis.com/get.php?resid=adv_onapsis-2014-002",
                  },
                  {
                     name: "57741",
                     refsource: "SECUNIA",
                     url: "http://secunia.com/advisories/57741",
                  },
                  {
                     name: "https://service.sap.com/sap/support/notes/1926485",
                     refsource: "MISC",
                     url: "https://service.sap.com/sap/support/notes/1926485",
                  },
                  {
                     name: "sap-ehp-log-sec-bypass(92334)",
                     refsource: "XF",
                     url: "https://exchange.xforce.ibmcloud.com/vulnerabilities/92334",
                  },
                  {
                     name: "http://www.onapsis.com/research-advisories.php",
                     refsource: "MISC",
                     url: "http://www.onapsis.com/research-advisories.php",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
      assignerShortName: "mitre",
      cveId: "CVE-2014-2748",
      datePublished: "2014-04-10T15:00:00",
      dateReserved: "2014-04-10T00:00:00",
      dateUpdated: "2024-08-06T10:21:36.111Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2020-6199
Vulnerability from cvelistv5
Published
2020-03-10 20:18
Modified
2024-08-04 08:55
Summary
The view FIMENAV_COMPCERT in SAP ERP (MENA Certificate Management), EAPPGLO version 607, SAP_FIN versions- 618, 730 and SAP S/4HANA (MENA Certificate Management), S4CORE versions- 100, 101, 102, 103, 104; does not have any authorization check to it due to which an attacker without an authorization group can maintain any company certificate, leading to Missing Authorization Check.
Impacted products
Vendor Product Version
SAP SE SAP ERP (EAPPGLO) Version: < 607
Create a notification for this product.
   SAP SE SAP ERP (SAP_FIN) Version: < 618
Version: < 730
Create a notification for this product.
   SAP SE SAP S/4HANA (S4CORE) Version: < 100
Version: < 101
Version: < 102
Version: < 103
Version: < 104
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T08:55:22.062Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305",
               },
               {
                  tags: [
                     "x_refsource_MISC",
                     "x_transferred",
                  ],
                  url: "https://launchpad.support.sap.com/#/notes/2871167",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "SAP ERP (EAPPGLO)",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 607",
                  },
               ],
            },
            {
               product: "SAP ERP (SAP_FIN)",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 618",
                  },
                  {
                     status: "affected",
                     version: "< 730",
                  },
               ],
            },
            {
               product: "SAP S/4HANA (S4CORE)",
               vendor: "SAP SE",
               versions: [
                  {
                     status: "affected",
                     version: "< 100",
                  },
                  {
                     status: "affected",
                     version: "< 101",
                  },
                  {
                     status: "affected",
                     version: "< 102",
                  },
                  {
                     status: "affected",
                     version: "< 103",
                  },
                  {
                     status: "affected",
                     version: "< 104",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "The view FIMENAV_COMPCERT in SAP ERP (MENA Certificate Management), EAPPGLO version 607, SAP_FIN versions- 618, 730 and SAP S/4HANA (MENA Certificate Management), S4CORE versions- 100, 101, 102, 103, 104; does not have any authorization check to it due to which an attacker without an authorization group can maintain any company certificate, leading to Missing Authorization Check.",
            },
         ],
         metrics: [
            {
               cvssV3_0: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
                  version: "3.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Missing Authorization Check",
                     lang: "en",
                     type: "text",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2020-03-10T20:18:38",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305",
            },
            {
               tags: [
                  "x_refsource_MISC",
               ],
               url: "https://launchpad.support.sap.com/#/notes/2871167",
            },
         ],
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "cna@sap.com",
               ID: "CVE-2020-6199",
               STATE: "PUBLIC",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "SAP ERP (EAPPGLO)",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "607",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SAP ERP (SAP_FIN)",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "618",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "730",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "SAP S/4HANA (S4CORE)",
                                 version: {
                                    version_data: [
                                       {
                                          version_name: "<",
                                          version_value: "100",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "101",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "102",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "103",
                                       },
                                       {
                                          version_name: "<",
                                          version_value: "104",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "SAP SE",
                     },
                  ],
               },
            },
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "The view FIMENAV_COMPCERT in SAP ERP (MENA Certificate Management), EAPPGLO version 607, SAP_FIN versions- 618, 730 and SAP S/4HANA (MENA Certificate Management), S4CORE versions- 100, 101, 102, 103, 104; does not have any authorization check to it due to which an attacker without an authorization group can maintain any company certificate, leading to Missing Authorization Check.",
                  },
               ],
            },
            impact: {
               cvss: {
                  baseScore: "5.4",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
                  version: "3.0",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "Missing Authorization Check",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305",
                     refsource: "MISC",
                     url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305",
                  },
                  {
                     name: "https://launchpad.support.sap.com/#/notes/2871167",
                     refsource: "MISC",
                     url: "https://launchpad.support.sap.com/#/notes/2871167",
                  },
               ],
            },
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2020-6199",
      datePublished: "2020-03-10T20:18:38",
      dateReserved: "2020-01-08T00:00:00",
      dateUpdated: "2024-08-04T08:55:22.062Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}