All the vulnerabilites related to sap - s4core
Vulnerability from fkie_nvd
Published
2023-07-11 03:15
Modified
2024-11-21 08:08
Severity ?
6.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Summary
When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable.
References
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | https://me.sap.com/notes/3341211 | Permissions Required | |
cna@sap.com | https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://me.sap.com/notes/3341211 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:s4core:104:*:*:*:*:*:*:*", "matchCriteriaId": "964023CE-6EA4-42BB-93B2-DCE6B36D3F89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:105:*:*:*:*:*:*:*", "matchCriteriaId": "84B775EF-6C11-4FAB-B5E7-8F6C4C5674BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:106:*:*:*:*:*:*:*", "matchCriteriaId": "14D17245-5B6D-4024-AFA6-8E0A70B294BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:107:*:*:*:*:*:*:*", "matchCriteriaId": "5DEFABE8-1797-4C7B-941C-3205AE90914B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable." } ], "id": "CVE-2023-35870", "lastModified": "2024-11-21T08:08:51.930", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "cna@sap.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-07-11T03:15:09.800", "references": [ { "source": "cna@sap.com", "tags": [ "Permissions Required" ], "url": "https://me.sap.com/notes/3341211" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://me.sap.com/notes/3341211" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "cna@sap.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-11 04:16
Modified
2024-11-21 07:56
Severity ?
3.7 (Low) - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
The SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sap | abap_platform | 75c | |
sap | abap_platform | 75d | |
sap | abap_platform | 75e | |
sap | application_interface_framework | aif_703 | |
sap | application_interface_framework | aifx_702 | |
sap | basis | 755 | |
sap | basis | 756 | |
sap | s4core | 100 | |
sap | s4core | 101 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:abap_platform:75c:*:*:*:*:*:*:*", "matchCriteriaId": "EF0145C4-663F-4E0F-B271-515EFB130D74", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:abap_platform:75d:*:*:*:*:*:*:*", "matchCriteriaId": "5406CCCC-4E8D-42A8-BFD9-771401C5DDE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:abap_platform:75e:*:*:*:*:*:*:*", "matchCriteriaId": "B4E59595-19DE-419C-8BBC-058332762E9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:application_interface_framework:aif_703:*:*:*:*:*:*:*", "matchCriteriaId": "3F2DF820-BD94-4DD5-8749-2890F3EFBF69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:application_interface_framework:aifx_702:*:*:*:*:*:*:*", "matchCriteriaId": "843B1EB2-F292-40D0-AD04-591EA3FF7103", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:basis:755:*:*:*:*:*:*:*", "matchCriteriaId": "98B5F69B-F93F-47F2-BCB7-4BEDED40E11D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:basis:756:*:*:*:*:*:*:*", "matchCriteriaId": "9B92D5C1-F724-4551-8365-0BBCE0956306", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:100:*:*:*:*:*:*:*", "matchCriteriaId": "3A444336-BCF2-4F87-B24E-F93E2801EE89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:101:*:*:*:*:*:*:*", "matchCriteriaId": "1045AD04-714D-4CC7-8153-6E3C00172A0C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.\n\n" } ], "id": "CVE-2023-29110", "lastModified": "2024-11-21T07:56:34.107", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 2.5, "source": "cna@sap.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-11T04:16:07.663", "references": [ { "source": "cna@sap.com", "tags": [ "Permissions Required" ], "url": "https://launchpad.support.sap.com/#/notes/3113349" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://launchpad.support.sap.com/#/notes/3113349" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-80" } ], "source": "cna@sap.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 02:15
Modified
2024-11-21 08:02
Severity ?
2.8 (Low) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
Summary
Vendor Master Hierarchy - versions SAP_APPL 500, SAP_APPL 600, SAP_APPL 602, SAP_APPL 603, SAP_APPL 604, SAP_APPL 605, SAP_APPL 606, SAP_APPL 616, SAP_APPL 617, SAP_APPL 618, S4CORE 100, does not perform necessary authorization checks for an authenticated user to access some of its function. This could lead to modification of data impacting the integrity of the system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sap | s4core | 100 | |
sap | vendor_master_hierarchy | sap_appl_500 | |
sap | vendor_master_hierarchy | sap_appl_600 | |
sap | vendor_master_hierarchy | sap_appl_602 | |
sap | vendor_master_hierarchy | sap_appl_603 | |
sap | vendor_master_hierarchy | sap_appl_604 | |
sap | vendor_master_hierarchy | sap_appl_605 | |
sap | vendor_master_hierarchy | sap_appl_606 | |
sap | vendor_master_hierarchy | sap_appl_616 | |
sap | vendor_master_hierarchy | sap_appl_617 | |
sap | vendor_master_hierarchy | sap_appl_618 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:s4core:100:*:*:*:*:*:*:*", "matchCriteriaId": "3A444336-BCF2-4F87-B24E-F93E2801EE89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:vendor_master_hierarchy:sap_appl_500:*:*:*:*:*:*:*", "matchCriteriaId": "D7E5C095-28E7-48C6-BA65-BE34C02FAF49", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:vendor_master_hierarchy:sap_appl_600:*:*:*:*:*:*:*", "matchCriteriaId": "FBA9A746-05C8-4A71-B587-2836E6FBF9D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:vendor_master_hierarchy:sap_appl_602:*:*:*:*:*:*:*", "matchCriteriaId": "F38990D3-BF87-45E0-9550-A9BA149EB123", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:vendor_master_hierarchy:sap_appl_603:*:*:*:*:*:*:*", "matchCriteriaId": "8D2B6ED7-1862-4B31-9C28-1A4D6340A7AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:vendor_master_hierarchy:sap_appl_604:*:*:*:*:*:*:*", "matchCriteriaId": "7CBC0E3A-E692-47EF-9DAF-9DFF180A1333", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:vendor_master_hierarchy:sap_appl_605:*:*:*:*:*:*:*", "matchCriteriaId": "767292C8-1FFB-4927-8F93-E09CB78E6331", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:vendor_master_hierarchy:sap_appl_606:*:*:*:*:*:*:*", "matchCriteriaId": "2E06E5C6-697E-4720-A747-B9775DE72BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:vendor_master_hierarchy:sap_appl_616:*:*:*:*:*:*:*", "matchCriteriaId": "A34591CD-23C7-4793-8529-6231DF06DF37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:vendor_master_hierarchy:sap_appl_617:*:*:*:*:*:*:*", "matchCriteriaId": "E7AEB0A8-2DCC-48F4-89FD-F7948FF34141", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:vendor_master_hierarchy:sap_appl_618:*:*:*:*:*:*:*", "matchCriteriaId": "16ED5D96-A396-4AFF-9B67-C43CC8628BC5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vendor Master Hierarchy - versions SAP_APPL 500, SAP_APPL 600, SAP_APPL 602, SAP_APPL 603, SAP_APPL 604, SAP_APPL 605, SAP_APPL 606, SAP_APPL 616, SAP_APPL 617, SAP_APPL 618, S4CORE 100, does not perform necessary authorization checks for an authenticated user to\u00a0access some of its function. This could lead to modification of data impacting the integrity of the system.\n\n" } ], "id": "CVE-2023-32112", "lastModified": "2024-11-21T08:02:43.980", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 1.4, "source": "cna@sap.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T02:15:12.800", "references": [ { "source": "cna@sap.com", "tags": [ "Broken Link" ], "url": "https://launchpad.support.sap.com/#/notes/2335198" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://launchpad.support.sap.com/#/notes/2335198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "cna@sap.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-09 05:15
Modified
2024-11-21 09:23
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
Summary
SAP S/4HANA Finance (Advanced Payment
Management) does not perform necessary authorization check for an authenticated
user, resulting in escalation of privileges. As a result, it has a low impact
to confidentiality and availability but there is no impact on the integrity.
References
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | https://me.sap.com/notes/3457354 | Permissions Required | |
cna@sap.com | https://url.sap/sapsecuritypatchday | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://me.sap.com/notes/3457354 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://url.sap/sapsecuritypatchday | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:s4core:107:*:*:*:*:*:*:*", "matchCriteriaId": "5DEFABE8-1797-4C7B-941C-3205AE90914B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:108:*:*:*:*:*:*:*", "matchCriteriaId": "78832FB6-B1DD-4516-B1DF-D90BB58BF25A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:s\\/4hana:-:*:*:*:*:*:*:*", "matchCriteriaId": "61225714-D573-435F-9423-7AE6A8ED59BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP S/4HANA Finance (Advanced Payment\nManagement) does not perform necessary authorization check for an authenticated\nuser, resulting in escalation of privileges. As a result, it has a low impact\nto confidentiality and availability but there is no impact on the integrity." }, { "lang": "es", "value": "SAP S/4HANA Finance (Advanced Payment Management) no realiza la verificaci\u00f3n de autorizaci\u00f3n necesaria para un usuario autenticado, lo que resulta en una escalada de privilegios. Como resultado, tiene un bajo impacto en la confidencialidad y la disponibilidad, pero no tiene ning\u00fan impacto en la integridad." } ], "id": "CVE-2024-37172", "lastModified": "2024-11-21T09:23:21.367", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "cna@sap.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-09T05:15:11.607", "references": [ { "source": "cna@sap.com", "tags": [ "Permissions Required" ], "url": "https://me.sap.com/notes/3457354" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://url.sap/sapsecuritypatchday" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://me.sap.com/notes/3457354" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://url.sap/sapsecuritypatchday" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "cna@sap.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-12 03:15
Modified
2024-11-21 08:19
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Summary
S4CORE (Manage Purchase Contracts App) - versions 102, 103, 104, 105, 106, 107, does not perform necessary authorization checks for an authenticated user. This could allow an attacker to perform unintended actions resulting in escalation of privileges which has low impact on confidentiality and integrity with no impact on availibility of the system.
References
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | https://me.sap.com/notes/3326361 | Permissions Required | |
cna@sap.com | https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://me.sap.com/notes/3326361 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:s4core:102:*:*:*:*:*:*:*", "matchCriteriaId": "04C95A73-48EB-446C-A5F0-20E1D6BC1779", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:103:*:*:*:*:*:*:*", "matchCriteriaId": "1C3C9003-68A6-4886-8979-9B7D01A35E40", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:104:*:*:*:*:*:*:*", "matchCriteriaId": "964023CE-6EA4-42BB-93B2-DCE6B36D3F89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:105:*:*:*:*:*:*:*", "matchCriteriaId": "84B775EF-6C11-4FAB-B5E7-8F6C4C5674BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:106:*:*:*:*:*:*:*", "matchCriteriaId": "14D17245-5B6D-4024-AFA6-8E0A70B294BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:107:*:*:*:*:*:*:*", "matchCriteriaId": "5DEFABE8-1797-4C7B-941C-3205AE90914B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "S4CORE (Manage Purchase Contracts App) - versions 102, 103, 104, 105, 106, 107, does not perform necessary authorization checks for an authenticated user. This could allow an attacker to perform unintended actions resulting in escalation of privileges which has low impact on confidentiality and integrity with no impact on availibility of the system.\n\n" }, { "lang": "es", "value": "S4CORE (Manage Purchase Contracts App): versiones 102, 103, 104, 105, 106, 107, no realiza las comprobaciones de autorizaci\u00f3n necesarias para un usuario autenticado. Esto podr\u00eda permitir a un atacante realizar acciones no intencionadas, lo que resulta en una escalada de privilegios que tiene un bajo impacto en la confidencialidad y la integridad sin impacto en la disponibilidad del sistema." } ], "id": "CVE-2023-40625", "lastModified": "2024-11-21T08:19:50.863", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "cna@sap.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-12T03:15:14.147", "references": [ { "source": "cna@sap.com", "tags": [ "Permissions Required" ], "url": "https://me.sap.com/notes/3326361" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://me.sap.com/notes/3326361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "cna@sap.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-15 19:15
Modified
2024-11-21 06:09
Severity ?
Summary
DMIS Mobile Plug-In or SAP S/4HANA, versions - DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 710, 2011_1_731, 710, 2011_1_752, 2020, SAPSCORE 125, S4CORE 102, 102, 103, 104, 105, allows an attacker with access to highly privileged account to execute manipulated query in NDZT tool to gain access to Superuser account, leading to SQL Injection vulnerability, that highly impacts systems Confidentiality, Integrity and Availability.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:dmis:710:*:*:*:*:*:*:*", "matchCriteriaId": "2C48386F-C6F6-42E5-9959-02F8A6D342FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:dmis:2011_1_620:*:*:*:*:*:*:*", "matchCriteriaId": "B7BDA4D1-2A3E-44FA-B4C2-3332190F9EA8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:dmis:2011_1_640:*:*:*:*:*:*:*", "matchCriteriaId": "6EA96DC2-4DAF-46F5-84CB-3E04FED9D6D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:dmis:2011_1_700:*:*:*:*:*:*:*", "matchCriteriaId": "3A24CF8F-3BF0-453E-85A3-1FEAC970F2FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:dmis:2011_1_710:*:*:*:*:*:*:*", "matchCriteriaId": "CA15FBA3-6A8A-40F6-8877-92DA36AD6951", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:dmis:2011_1_730:*:*:*:*:*:*:*", "matchCriteriaId": "0E5DB1DF-AA42-40FF-90C0-5FC2D5D270E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:dmis:2011_1_731:*:*:*:*:*:*:*", "matchCriteriaId": "F99C414C-4256-44C6-AE0F-22BDFEF7C48A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:dmis:2011_1_752:*:*:*:*:*:*:*", "matchCriteriaId": "F970480D-5A7A-477E-B7B4-60883E343DC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:dmis:2020125:*:*:*:*:*:*:*", "matchCriteriaId": "02C8F50F-F150-42BC-99E1-2AB647052ADD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:102:*:*:*:*:*:*:*", "matchCriteriaId": "04C95A73-48EB-446C-A5F0-20E1D6BC1779", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:103:*:*:*:*:*:*:*", "matchCriteriaId": "1C3C9003-68A6-4886-8979-9B7D01A35E40", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:104:*:*:*:*:*:*:*", "matchCriteriaId": "964023CE-6EA4-42BB-93B2-DCE6B36D3F89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:105:*:*:*:*:*:*:*", "matchCriteriaId": "84B775EF-6C11-4FAB-B5E7-8F6C4C5674BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapscore:125:*:*:*:*:*:*:*", "matchCriteriaId": "FE9149EF-F7D0-45AA-99F5-90101F19E282", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "DMIS Mobile Plug-In or SAP S/4HANA, versions - DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 710, 2011_1_731, 710, 2011_1_752, 2020, SAPSCORE 125, S4CORE 102, 102, 103, 104, 105, allows an attacker with access to highly privileged account to execute manipulated query in NDZT tool to gain access to Superuser account, leading to SQL Injection vulnerability, that highly impacts systems Confidentiality, Integrity and Availability." }, { "lang": "es", "value": "DMIS Mobile Plug-In o SAP S/4HANA, versiones - DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 710, 2011_1_731, 710, 2011_1_752, 2020, SAPSCORE 125, S4CORE 102, 102, 103, 104, 105, permite a un atacante con acceso a una cuenta altamente privilegiada ejecutar una consulta manipulada en la herramienta NDZT para conseguir acceso a la cuenta Superuser, conllevando a una vulnerabilidad de Inyecci\u00f3n SQL, que presenta un gran impacto en la Confidencialidad, Integridad y Disponibilidad de los sistemas" } ], "id": "CVE-2021-33701", "lastModified": "2024-11-21T06:09:24.077", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "cna@sap.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-15T19:15:09.697", "references": [ { "source": "cna@sap.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html" }, { "source": "cna@sap.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html" }, { "source": "cna@sap.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Dec/35" }, { "source": "cna@sap.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Dec/36" }, { "source": "cna@sap.com", "tags": [ "Permissions Required", "VDB Entry", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/3078312" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Dec/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2021/Dec/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "VDB Entry", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/3078312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "cna@sap.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2018-05-09 20:29
Modified
2024-11-21 04:03
Severity ?
3.7 (Low) - CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
4.6 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
4.6 (Medium) - CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Summary
SAP Enterprise Financial Services (SAPSCORE 1.11, 1.12; S4CORE 1.01, 1.02; EA-FINSERV 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
References
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | http://www.securityfocus.com/bid/104116 | Third Party Advisory, VDB Entry | |
cna@sap.com | https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ | Vendor Advisory | |
cna@sap.com | https://launchpad.support.sap.com/#/notes/2596627 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104116 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/2596627 | Permissions Required |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sap | sapscore | 1.11 | |
sap | sapscore | 1.12 | |
sap | s4core | 1.01 | |
sap | s4core | 1.02 | |
sap | ea-finserv | 6.04 | |
sap | ea-finserv | 6.05 | |
sap | ea-finserv | 6.06 | |
sap | ea-finserv | 6.16 | |
sap | ea-finserv | 6.17 | |
sap | ea-finserv | 6.18 | |
sap | ea-finserv | 8.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:sapscore:1.11:*:*:*:*:*:*:*", "matchCriteriaId": "4AA40396-5487-4306-993A-216BEC68AE65", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapscore:1.12:*:*:*:*:*:*:*", "matchCriteriaId": "16B411D4-96AC-4706-97EA-E2694319154A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:s4core:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "A80D9723-2BD5-4861-AAC8-C476AE1D6957", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8AB6B-B411-4336-9DD7-50D9E1C94FC2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:ea-finserv:6.04:*:*:*:*:*:*:*", "matchCriteriaId": "F7B8824B-A919-40E3-82EC-291445014BE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.05:*:*:*:*:*:*:*", "matchCriteriaId": "DE5119FD-7E2F-4ECC-9DA9-706FABE46EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "4C0060F4-07EB-4B11-A5FE-C6981FBB6458", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3F343C6-A992-49E9-B7FC-8E0CE24F4338", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.17:*:*:*:*:*:*:*", "matchCriteriaId": "3ABAF511-4A30-4AD1-9C38-EDB9ECBCEEC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.18:*:*:*:*:*:*:*", "matchCriteriaId": "B4EDC68A-4DA0-4399-A3CF-A41B7E425E1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECD565C-751A-40D4-831D-4012CE388CDA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP Enterprise Financial Services (SAPSCORE 1.11, 1.12; S4CORE 1.01, 1.02; EA-FINSERV 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges." }, { "lang": "es", "value": "SAP Enterprise Financial Services (SAPSCORE 1.11, 1.12; S4CORE 1.01, 1.02; EA-FINSERV 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0) no realiza las comprobaciones necesarias de autorizaci\u00f3n para un usuario autenticado, lo que resulta en un escalado de privilegios." } ], "id": "CVE-2018-2419", "lastModified": "2024-11-21T04:03:46.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 1.2, "impactScore": 2.5, "source": "cna@sap.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.1, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-09T20:29:00.887", "references": [ { "source": "cna@sap.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104116" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/" }, { "source": "cna@sap.com", "tags": [ "Permissions Required" ], "url": "https://launchpad.support.sap.com/#/notes/2596627" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://launchpad.support.sap.com/#/notes/2596627" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-07-09 04:15
Modified
2024-11-21 09:28
Severity ?
7.7 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Elements of PDCE does not perform necessary
authorization checks for an authenticated user, resulting in escalation of
privileges.
This
allows an attacker to read sensitive information causing high impact on the
confidentiality of the application.
References
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | https://me.sap.com/notes/3483344 | Permissions Required | |
cna@sap.com | https://url.sap/sapsecuritypatchday | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://me.sap.com/notes/3483344 | Permissions Required | |
af854a3a-2127-422b-91ae-364da2661108 | https://url.sap/sapsecuritypatchday | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:s4core:102:*:*:*:*:*:*:*", "matchCriteriaId": "04C95A73-48EB-446C-A5F0-20E1D6BC1779", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:103:*:*:*:*:*:*:*", "matchCriteriaId": "1C3C9003-68A6-4886-8979-9B7D01A35E40", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4coreop:104:*:*:*:*:*:*:*", "matchCriteriaId": "666D246E-3DF3-494C-8BD6-6C2F7C0D78C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4coreop:105:*:*:*:*:*:*:*", "matchCriteriaId": "D6B6F939-A3CD-4C0C-A6E7-E3BD4ADB5288", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4coreop:106:*:*:*:*:*:*:*", "matchCriteriaId": "02AEDF75-D0D4-4221-BB40-9A8DC51FA84D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4coreop:107:*:*:*:*:*:*:*", "matchCriteriaId": "81ABE589-A7D1-42EF-B5A9-A94C8D0AE3AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4coreop:108:*:*:*:*:*:*:*", "matchCriteriaId": "7C1E9400-4CEB-4185-BC03-72B7F59DF03C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Elements of PDCE does not perform necessary\nauthorization checks for an authenticated user, resulting in escalation of\nprivileges.\n\n\n\nThis\nallows an attacker to read sensitive information causing high impact on the\nconfidentiality of the application." }, { "lang": "es", "value": "Elements of PDCE no realiza las verificaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en una escalada de privilegios. Esto permite a un atacante leer informaci\u00f3n confidencial causando un alto impacto en la confidencialidad de la aplicaci\u00f3n." } ], "id": "CVE-2024-39592", "lastModified": "2024-11-21T09:28:04.573", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 4.0, "source": "cna@sap.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-07-09T04:15:13.420", "references": [ { "source": "cna@sap.com", "tags": [ "Permissions Required" ], "url": "https://me.sap.com/notes/3483344" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://url.sap/sapsecuritypatchday" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://me.sap.com/notes/3483344" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://url.sap/sapsecuritypatchday" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "cna@sap.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-01-08 20:29
Modified
2024-11-21 04:03
Severity ?
Summary
SAP Enterprise Financial Services (fixed in SAPSCORE 1.13, 1.14, 1.15; S4CORE 1.01, 1.02, 1.03; EA-FINSERV 1.10, 2.0, 5.0, 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0; Bank/CFM 4.63_20) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
References
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | http://www.securityfocus.com/bid/106477 | Third Party Advisory, VDB Entry | |
cna@sap.com | https://launchpad.support.sap.com/#/notes/2662687 | Permissions Required, Vendor Advisory | |
cna@sap.com | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106477 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/2662687 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sap | sapscore | 1.13 | |
sap | sapscore | 1.14 | |
sap | sapscore | 1.15 | |
sap | s4core | 1.01 | |
sap | s4core | 1.02 | |
sap | s4core | 1.03 | |
sap | ea-finserv | 1.10 | |
sap | ea-finserv | 2.0 | |
sap | ea-finserv | 5.0 | |
sap | ea-finserv | 6.0 | |
sap | ea-finserv | 6.03 | |
sap | ea-finserv | 6.04 | |
sap | ea-finserv | 6.05 | |
sap | ea-finserv | 6.06 | |
sap | ea-finserv | 6.16 | |
sap | ea-finserv | 6.17 | |
sap | ea-finserv | 6.18 | |
sap | ea-finserv | 8.0 | |
sap | bank\/cfm | 4.63_20 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:sapscore:1.13:*:*:*:*:*:*:*", "matchCriteriaId": "A7F34FFD-52D4-4137-ACFF-E1D1A5961BC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapscore:1.14:*:*:*:*:*:*:*", "matchCriteriaId": "65BB7CFD-A663-451E-A8E8-8ACD00DAC03D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:sapscore:1.15:*:*:*:*:*:*:*", "matchCriteriaId": "E3C233D8-6DCC-4723-ACC7-E259412E0D95", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:s4core:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "A80D9723-2BD5-4861-AAC8-C476AE1D6957", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:1.02:*:*:*:*:*:*:*", "matchCriteriaId": "FCD8AB6B-B411-4336-9DD7-50D9E1C94FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "17AEBFBA-0E6B-44C9-8E2B-18823944025E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:ea-finserv:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "03E5225C-6CEA-4D9C-9F39-5FC5C3FBF9BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DF0A8603-FE03-4E19-A41A-CD512C64411A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4225331D-D4A6-4C4B-81CA-AEA5E9752B81", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D988C6A-FFA9-4674-8F4D-D5CF944A2EAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.03:*:*:*:*:*:*:*", "matchCriteriaId": "B1FF1A3A-2030-4690-875C-5FB11EA69FEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.04:*:*:*:*:*:*:*", "matchCriteriaId": "F7B8824B-A919-40E3-82EC-291445014BE8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.05:*:*:*:*:*:*:*", "matchCriteriaId": "DE5119FD-7E2F-4ECC-9DA9-706FABE46EC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.06:*:*:*:*:*:*:*", "matchCriteriaId": "4C0060F4-07EB-4B11-A5FE-C6981FBB6458", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.16:*:*:*:*:*:*:*", "matchCriteriaId": "A3F343C6-A992-49E9-B7FC-8E0CE24F4338", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.17:*:*:*:*:*:*:*", "matchCriteriaId": "3ABAF511-4A30-4AD1-9C38-EDB9ECBCEEC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:6.18:*:*:*:*:*:*:*", "matchCriteriaId": "B4EDC68A-4DA0-4399-A3CF-A41B7E425E1D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ea-finserv:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "5ECD565C-751A-40D4-831D-4012CE388CDA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:bank\\/cfm:4.63_20:*:*:*:*:*:*:*", "matchCriteriaId": "978F7B9F-490A-4506-B340-314774D4AFF5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP Enterprise Financial Services (fixed in SAPSCORE 1.13, 1.14, 1.15; S4CORE 1.01, 1.02, 1.03; EA-FINSERV 1.10, 2.0, 5.0, 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0; Bank/CFM 4.63_20) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges." }, { "lang": "es", "value": "SAP Enterprise Financial Services (solucionado en SAPSCORE 1.13, 1.14, 1.15; S4CORE 1.01, 1.02, 1.03; EA-FINSERV 1.10, 2.0, 5.0, 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0; Bank/CFM 4.63_20) no realiza las comprobaciones necesarias de autorizaci\u00f3n para un usuario autenticado, lo que resulta en un escalado de privilegios." } ], "id": "CVE-2018-2484", "lastModified": "2024-11-21T04:03:54.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-01-08T20:29:00.297", "references": [ { "source": "cna@sap.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106477" }, { "source": "cna@sap.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2662687" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2662687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-04-11 03:15
Modified
2024-11-21 07:56
Severity ?
4.4 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N
4.6 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
4.6 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Summary
The SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sap | abap_platform | 75c | |
sap | abap_platform | 75d | |
sap | abap_platform | 75e | |
sap | application_interface_framework | aif_703 | |
sap | application_interface_framework | aifx_702 | |
sap | basis | 755 | |
sap | basis | 756 | |
sap | s4core | 101 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:abap_platform:75c:*:*:*:*:*:*:*", "matchCriteriaId": "EF0145C4-663F-4E0F-B271-515EFB130D74", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:abap_platform:75d:*:*:*:*:*:*:*", "matchCriteriaId": "5406CCCC-4E8D-42A8-BFD9-771401C5DDE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:abap_platform:75e:*:*:*:*:*:*:*", "matchCriteriaId": "B4E59595-19DE-419C-8BBC-058332762E9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:application_interface_framework:aif_703:*:*:*:*:*:*:*", "matchCriteriaId": "3F2DF820-BD94-4DD5-8749-2890F3EFBF69", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:application_interface_framework:aifx_702:*:*:*:*:*:*:*", "matchCriteriaId": "843B1EB2-F292-40D0-AD04-591EA3FF7103", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:basis:755:*:*:*:*:*:*:*", "matchCriteriaId": "98B5F69B-F93F-47F2-BCB7-4BEDED40E11D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:basis:756:*:*:*:*:*:*:*", "matchCriteriaId": "9B92D5C1-F724-4551-8365-0BBCE0956306", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:s4core:101:*:*:*:*:*:*:*", "matchCriteriaId": "1045AD04-714D-4CC7-8153-6E3C00172A0C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.\n\n" } ], "id": "CVE-2023-29109", "lastModified": "2024-11-21T07:56:33.963", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 2.7, "source": "cna@sap.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-04-11T03:15:07.927", "references": [ { "source": "cna@sap.com", "tags": [ "Permissions Required" ], "url": "https://launchpad.support.sap.com/#/notes/3115598" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://launchpad.support.sap.com/#/notes/3115598" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1236" } ], "source": "cna@sap.com", "type": "Primary" } ] }
cve-2024-39592
Vulnerability from cvelistv5
Published
2024-07-09 03:45
Modified
2024-08-02 04:26
Severity ?
EPSS score ?
Summary
Elements of PDCE does not perform necessary
authorization checks for an authenticated user, resulting in escalation of
privileges.
This
allows an attacker to read sensitive information causing high impact on the
confidentiality of the application.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:sap_se:sap_pdce:*:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "sap_pdce", "vendor": "sap_se", "versions": [ { "status": "affected", "version": "S4CORE 102" }, { "status": "affected", "version": "S4CORE 103" }, { "status": "affected", "version": "S4COREOP 104" }, { "status": "affected", "version": "S4COREOP 105" }, { "status": "affected", "version": "S4COREOP 106" }, { "status": "affected", "version": "S4COREOP 107" }, { "status": "affected", "version": "S4COREOP 108" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-39592", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-24T18:22:20.617499Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T18:33:09.047Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:26:15.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://url.sap/sapsecuritypatchday" }, { "tags": [ "x_transferred" ], "url": "https://me.sap.com/notes/3483344" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SAP PDCE", "vendor": "SAP_SE", "versions": [ { "status": "affected", "version": "S4CORE 102" }, { "status": "affected", "version": "S4CORE 103" }, { "status": "affected", "version": "S4COREOP 104" }, { "status": "affected", "version": "S4COREOP 105" }, { "status": "affected", "version": "S4COREOP 106" }, { "status": "affected", "version": "S4COREOP 107" }, { "status": "affected", "version": "S4COREOP 108" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eElements of PDCE does not perform necessary\nauthorization checks for an authenticated user, resulting in escalation of\nprivileges.\u003c/p\u003e\n\nThis\nallows an attacker to read sensitive information causing high impact on the\nconfidentiality of the application.\n\n\n\n" } ], "value": "Elements of PDCE does not perform necessary\nauthorization checks for an authenticated user, resulting in escalation of\nprivileges.\n\n\n\nThis\nallows an attacker to read sensitive information causing high impact on the\nconfidentiality of the application." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T03:45:56.018Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://url.sap/sapsecuritypatchday" }, { "url": "https://me.sap.com/notes/3483344" } ], "source": { "discovery": "UNKNOWN" }, "title": "[CVE-2024-39592] Missing Authorization check in SAP PDCE", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2024-39592", "datePublished": "2024-07-09T03:45:56.018Z", "dateReserved": "2024-06-26T09:58:24.095Z", "dateUpdated": "2024-08-02T04:26:15.969Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-40625
Vulnerability from cvelistv5
Published
2023-09-12 02:00
Modified
2024-09-25 15:28
Severity ?
EPSS score ?
Summary
S4CORE (Manage Purchase Contracts App) - versions 102, 103, 104, 105, 106, 107, does not perform necessary authorization checks for an authenticated user. This could allow an attacker to perform unintended actions resulting in escalation of privileges which has low impact on confidentiality and integrity with no impact on availibility of the system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAP_SE | SAP Manage Purchase Contracts App |
Version: S4CORE 102 Version: S4CORE 103 Version: S4CORE 104 Version: S4CORE 105 Version: S4CORE 106 Version: S4CORE 107 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T18:38:51.007Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://me.sap.com/notes/3326361" }, { "tags": [ "x_transferred" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-40625", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T15:06:14.215597Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T15:28:24.390Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SAP Manage Purchase Contracts App", "vendor": "SAP_SE", "versions": [ { "status": "affected", "version": "S4CORE 102" }, { "status": "affected", "version": "S4CORE 103" }, { "status": "affected", "version": "S4CORE 104" }, { "status": "affected", "version": "S4CORE 105" }, { "status": "affected", "version": "S4CORE 106" }, { "status": "affected", "version": "S4CORE 107" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eS4CORE (Manage Purchase Contracts App) - versions 102, 103, 104, 105, 106, 107, does not perform necessary authorization checks for an authenticated user. This could allow an attacker to perform unintended actions resulting in escalation of privileges which has low impact on confidentiality and integrity with no impact on availibility of the system.\u003c/p\u003e" } ], "value": "S4CORE (Manage Purchase Contracts App) - versions 102, 103, 104, 105, 106, 107, does not perform necessary authorization checks for an authenticated user. This could allow an attacker to perform unintended actions resulting in escalation of privileges which has low impact on confidentiality and integrity with no impact on availibility of the system.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "eng", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-12T02:00:13.727Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://me.sap.com/notes/3326361" }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Missing Authorization check in SAP Manage Purchase Contracts App", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2023-40625", "datePublished": "2023-09-12T02:00:13.727Z", "dateReserved": "2023-08-17T18:10:44.968Z", "dateUpdated": "2024-09-25T15:28:24.390Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-2484
Vulnerability from cvelistv5
Published
2019-01-08 20:00
Modified
2024-08-05 04:21
Severity ?
EPSS score ?
Summary
SAP Enterprise Financial Services (fixed in SAPSCORE 1.13, 1.14, 1.15; S4CORE 1.01, 1.02, 1.03; EA-FINSERV 1.10, 2.0, 5.0, 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0; Bank/CFM 4.63_20) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
References
▼ | URL | Tags |
---|---|---|
https://launchpad.support.sap.com/#/notes/2662687 | x_refsource_MISC | |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985 | x_refsource_MISC | |
http://www.securityfocus.com/bid/106477 | vdb-entry, x_refsource_BID |
Impacted products
Vendor | Product | Version | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | SAP SE | SAP Enterprise Financial Services (SAPSCORE) |
Version: < 1.13 Version: < 1.14 Version: < 1.15 |
||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:21:33.945Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2662687" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985" }, { "name": "106477", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106477" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP Enterprise Financial Services (SAPSCORE)", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c 1.13" }, { "status": "affected", "version": "\u003c 1.14" }, { "status": "affected", "version": "\u003c 1.15" } ] }, { "product": "SAP Enterprise Financial Services (S4CORE)", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c 1.01" }, { "status": "affected", "version": "\u003c 1.02" }, { "status": "affected", "version": "\u003c 1.03" } ] }, { "product": "SAP Enterprise Financial Services (EA-FINSERV)", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c 1.10" }, { "status": "affected", "version": "\u003c 2.0" }, { "status": "affected", "version": "\u003c 5.0" }, { "status": "affected", "version": "\u003c 6.0" }, { "status": "affected", "version": "\u003c 6.03" }, { "status": "affected", "version": "\u003c 6.04" }, { "status": "affected", "version": "\u003c 6.05" }, { "status": "affected", "version": "\u003c 6.06" }, { "status": "affected", "version": "\u003c 6.16" }, { "status": "affected", "version": "\u003c 6.17" }, { "status": "affected", "version": "\u003c 6.18" }, { "status": "affected", "version": "\u003c 8.0" } ] }, { "product": "SAP Enterprise Financial Services (Bank/CFM)", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c 4.63_20" } ] } ], "datePublic": "2019-01-08T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP Enterprise Financial Services (fixed in SAPSCORE 1.13, 1.14, 1.15; S4CORE 1.01, 1.02, 1.03; EA-FINSERV 1.10, 2.0, 5.0, 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0; Bank/CFM 4.63_20) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges." } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Authorization Check", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-01-09T10:57:01", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/2662687" }, { "tags": [ "x_refsource_MISC" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985" }, { "name": "106477", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106477" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2018-2484", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP Enterprise Financial Services (SAPSCORE)", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "1.13" }, { "version_name": "\u003c", "version_value": "1.14" }, { "version_name": "\u003c", "version_value": "1.15" } ] } }, { "product_name": "SAP Enterprise Financial Services (S4CORE)", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "1.01" }, { "version_name": "\u003c", "version_value": "1.02" }, { "version_name": "\u003c", "version_value": "1.03" } ] } }, { "product_name": "SAP Enterprise Financial Services (EA-FINSERV)", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "1.10" }, { "version_name": "\u003c", "version_value": "2.0" }, { "version_name": "\u003c", "version_value": "5.0" }, { "version_name": "\u003c", "version_value": "6.0" }, { "version_name": "\u003c", "version_value": "6.03" }, { "version_name": "\u003c", "version_value": "6.04" }, { "version_name": "\u003c", "version_value": "6.05" }, { "version_name": "\u003c", "version_value": "6.06" }, { "version_name": "\u003c", "version_value": "6.16" }, { "version_name": "\u003c", "version_value": "6.17" }, { "version_name": "\u003c", "version_value": "6.18" }, { "version_name": "\u003c", "version_value": "8.0" } ] } }, { "product_name": "SAP Enterprise Financial Services (Bank/CFM)", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "4.63_20" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP Enterprise Financial Services (fixed in SAPSCORE 1.13, 1.14, 1.15; S4CORE 1.01, 1.02, 1.03; EA-FINSERV 1.10, 2.0, 5.0, 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0; Bank/CFM 4.63_20) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Authorization Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://launchpad.support.sap.com/#/notes/2662687", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/2662687" }, { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985", "refsource": "MISC", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985" }, { "name": "106477", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106477" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2018-2484", "datePublished": "2019-01-08T20:00:00", "dateReserved": "2017-12-15T00:00:00", "dateUpdated": "2024-08-05T04:21:33.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-32112
Vulnerability from cvelistv5
Published
2023-05-09 01:42
Modified
2024-08-02 15:03
Severity ?
EPSS score ?
Summary
Vendor Master Hierarchy - versions SAP_APPL 500, SAP_APPL 600, SAP_APPL 602, SAP_APPL 603, SAP_APPL 604, SAP_APPL 605, SAP_APPL 606, SAP_APPL 616, SAP_APPL 617, SAP_APPL 618, S4CORE 100, does not perform necessary authorization checks for an authenticated user to access some of its function. This could lead to modification of data impacting the integrity of the system.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAP_SE | Vendor Master Hierarchy |
Version: SAP_APPL 500 Version: SAP_APPL 600 Version: SAP_APPL 602 Version: SAP_APPL 603 Version: SAP_APPL 604 Version: SAP_APPL 605 Version: SAP_APPL 606 Version: SAP_APPL 616 Version: SAP_APPL 617 Version: SAP_APPL 618 Version: S4CORE 100 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T15:03:28.988Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2335198" }, { "tags": [ "x_transferred" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Vendor Master Hierarchy", "vendor": "SAP_SE", "versions": [ { "status": "affected", "version": "SAP_APPL 500" }, { "status": "affected", "version": "SAP_APPL 600" }, { "status": "affected", "version": "SAP_APPL 602" }, { "status": "affected", "version": "SAP_APPL 603" }, { "status": "affected", "version": "SAP_APPL 604" }, { "status": "affected", "version": "SAP_APPL 605" }, { "status": "affected", "version": "SAP_APPL 606" }, { "status": "affected", "version": "SAP_APPL 616" }, { "status": "affected", "version": "SAP_APPL 617" }, { "status": "affected", "version": "SAP_APPL 618" }, { "status": "affected", "version": "S4CORE 100" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eVendor Master Hierarchy - versions SAP_APPL 500, SAP_APPL 600, SAP_APPL 602, SAP_APPL 603, SAP_APPL 604, SAP_APPL 605, SAP_APPL 606, SAP_APPL 616, SAP_APPL 617, SAP_APPL 618, S4CORE 100, does not perform necessary authorization checks for an authenticated user to\u00a0access some of its function. This could lead to modification of data impacting the integrity of the system.\u003c/p\u003e" } ], "value": "Vendor Master Hierarchy - versions SAP_APPL 500, SAP_APPL 600, SAP_APPL 602, SAP_APPL 603, SAP_APPL 604, SAP_APPL 605, SAP_APPL 606, SAP_APPL 616, SAP_APPL 617, SAP_APPL 618, S4CORE 100, does not perform necessary authorization checks for an authenticated user to\u00a0access some of its function. This could lead to modification of data impacting the integrity of the system.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 2.8, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "eng", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-09T01:46:29.784Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://launchpad.support.sap.com/#/notes/2335198" }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Missing Authorization Check in Vendor Master Hierarchy", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2023-32112", "datePublished": "2023-05-09T01:42:23.289Z", "dateReserved": "2023-05-03T14:48:13.764Z", "dateUpdated": "2024-08-02T15:03:28.988Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33701
Vulnerability from cvelistv5
Published
2021-09-15 18:01
Modified
2024-08-03 23:58
Severity ?
EPSS score ?
Summary
DMIS Mobile Plug-In or SAP S/4HANA, versions - DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 710, 2011_1_731, 710, 2011_1_752, 2020, SAPSCORE 125, S4CORE 102, 102, 103, 104, 105, allows an attacker with access to highly privileged account to execute manipulated query in NDZT tool to gain access to Superuser account, leading to SQL Injection vulnerability, that highly impacts systems Confidentiality, Integrity and Availability.
References
▼ | URL | Tags |
---|---|---|
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806 | x_refsource_MISC | |
https://launchpad.support.sap.com/#/notes/3078312 | x_refsource_MISC | |
http://seclists.org/fulldisclosure/2021/Dec/36 | mailing-list, x_refsource_FULLDISC | |
http://seclists.org/fulldisclosure/2021/Dec/35 | mailing-list, x_refsource_FULLDISC | |
http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html | x_refsource_MISC | |
http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | SAP SE | DMIS Mobile Plug-In |
Version: < DMIS 2011_1_620 Version: < 2011_1_640 Version: < 2011_1_700 Version: < 2011_1_710 Version: < 2011_1_730 Version: < 710 Version: < 2011_1_731 Version: < 2011_1_752 Version: < 2020 |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:58:22.494Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/3078312" }, { "name": "20211214 SEC Consult SA-20211214-1 :: Remote ABAP Code Injection in SAP Netweaver IUUC_RECON_RC_COUNT_TABLE_BIG", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Dec/36" }, { "name": "20211214 SEC Consult SA-20211214-0 :: Remote ADBC SQL Injection in SAP Netweaver IUUC_RECON_RC_COUNT_TABLE_BIG", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2021/Dec/35" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "DMIS Mobile Plug-In", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c DMIS 2011_1_620" }, { "status": "affected", "version": "\u003c 2011_1_640" }, { "status": "affected", "version": "\u003c 2011_1_700" }, { "status": "affected", "version": "\u003c 2011_1_710" }, { "status": "affected", "version": "\u003c 2011_1_730" }, { "status": "affected", "version": "\u003c 710" }, { "status": "affected", "version": "\u003c 2011_1_731" }, { "status": "affected", "version": "\u003c 2011_1_752" }, { "status": "affected", "version": "\u003c 2020" } ] }, { "product": "SAP S/4HANA", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c SAPSCORE 125" }, { "status": "affected", "version": "\u003c S4CORE 102" }, { "status": "affected", "version": "\u003c 102" }, { "status": "affected", "version": "\u003c 103" }, { "status": "affected", "version": "\u003c 104" }, { "status": "affected", "version": "\u003c 105" } ] } ], "descriptions": [ { "lang": "en", "value": "DMIS Mobile Plug-In or SAP S/4HANA, versions - DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 710, 2011_1_731, 710, 2011_1_752, 2020, SAPSCORE 125, S4CORE 102, 102, 103, 104, 105, allows an attacker with access to highly privileged account to execute manipulated query in NDZT tool to gain access to Superuser account, leading to SQL Injection vulnerability, that highly impacts systems Confidentiality, Integrity and Availability." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\ufffd)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-15T17:06:24", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/3078312" }, { "name": "20211214 SEC Consult SA-20211214-1 :: Remote ABAP Code Injection in SAP Netweaver IUUC_RECON_RC_COUNT_TABLE_BIG", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Dec/36" }, { "name": "20211214 SEC Consult SA-20211214-0 :: Remote ADBC SQL Injection in SAP Netweaver IUUC_RECON_RC_COUNT_TABLE_BIG", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2021/Dec/35" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2021-33701", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "DMIS Mobile Plug-In", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "DMIS 2011_1_620" }, { "version_name": "\u003c", "version_value": "2011_1_640" }, { "version_name": "\u003c", "version_value": "2011_1_700" }, { "version_name": "\u003c", "version_value": "2011_1_710" }, { "version_name": "\u003c", "version_value": "2011_1_730" }, { "version_name": "\u003c", "version_value": "710" }, { "version_name": "\u003c", "version_value": "2011_1_731" }, { "version_name": "\u003c", "version_value": "710" }, { "version_name": "\u003c", "version_value": "2011_1_752" }, { "version_name": "\u003c", "version_value": "2020" } ] } }, { "product_name": "SAP S/4HANA", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "SAPSCORE 125" }, { "version_name": "\u003c", "version_value": "S4CORE 102" }, { "version_name": "\u003c", "version_value": "102" }, { "version_name": "\u003c", "version_value": "103" }, { "version_name": "\u003c", "version_value": "104" }, { "version_name": "\u003c", "version_value": "105" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "DMIS Mobile Plug-In or SAP S/4HANA, versions - DMIS 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 710, 2011_1_731, 710, 2011_1_752, 2020, SAPSCORE 125, S4CORE 102, 102, 103, 104, 105, allows an attacker with access to highly privileged account to execute manipulated query in NDZT tool to gain access to Superuser account, leading to SQL Injection vulnerability, that highly impacts systems Confidentiality, Integrity and Availability." } ] }, "impact": { "cvss": { "baseScore": "9.1", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\ufffd)" } ] } ] }, "references": { "reference_data": [ { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806", "refsource": "MISC", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806" }, { "name": "https://launchpad.support.sap.com/#/notes/3078312", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/3078312" }, { "name": "20211214 SEC Consult SA-20211214-1 :: Remote ABAP Code Injection in SAP Netweaver IUUC_RECON_RC_COUNT_TABLE_BIG", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Dec/36" }, { "name": "20211214 SEC Consult SA-20211214-0 :: Remote ADBC SQL Injection in SAP Netweaver IUUC_RECON_RC_COUNT_TABLE_BIG", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Dec/35" }, { "name": "http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/165303/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-SQL-Injection.html" }, { "name": "http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/165304/SAP-Netweaver-IUUC_RECON_RC_COUNT_TABLE_BIG-ABAP-Code-Injection.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2021-33701", "datePublished": "2021-09-15T18:01:55", "dateReserved": "2021-05-28T00:00:00", "dateUpdated": "2024-08-03T23:58:22.494Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-37172
Vulnerability from cvelistv5
Published
2024-07-09 04:15
Modified
2024-08-02 03:50
Severity ?
EPSS score ?
Summary
SAP S/4HANA Finance (Advanced Payment
Management) does not perform necessary authorization check for an authenticated
user, resulting in escalation of privileges. As a result, it has a low impact
to confidentiality and availability but there is no impact on the integrity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAP_SE | SAP S/4HANA Finance (Advanced Payment Management) |
Version: S4CORE 107 Version: S4CORE 108 |
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-37172", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-09T15:16:10.095214Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-09T15:16:18.449Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T03:50:54.731Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://url.sap/sapsecuritypatchday" }, { "tags": [ "x_transferred" ], "url": "https://me.sap.com/notes/3457354" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SAP S/4HANA Finance (Advanced Payment Management)", "vendor": "SAP_SE", "versions": [ { "status": "affected", "version": "S4CORE 107" }, { "status": "affected", "version": "S4CORE 108" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "SAP S/4HANA Finance (Advanced Payment\nManagement) does not perform necessary authorization check for an authenticated\nuser, resulting in escalation of privileges. As a result, it has a low impact\nto confidentiality and availability but there is no impact on the integrity.\n\n\n\n" } ], "value": "SAP S/4HANA Finance (Advanced Payment\nManagement) does not perform necessary authorization check for an authenticated\nuser, resulting in escalation of privileges. As a result, it has a low impact\nto confidentiality and availability but there is no impact on the integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-862", "description": "CWE-862: Missing Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-09T04:15:22.833Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://url.sap/sapsecuritypatchday" }, { "url": "https://me.sap.com/notes/3457354" } ], "source": { "discovery": "UNKNOWN" }, "title": "[CVE-2024-37172] Missing Authorization check in SAP S/4HANA Finance (Advanced Payment Management)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2024-37172", "datePublished": "2024-07-09T04:15:22.833Z", "dateReserved": "2024-06-04T07:49:42.491Z", "dateUpdated": "2024-08-02T03:50:54.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-35870
Vulnerability from cvelistv5
Published
2023-07-11 02:40
Modified
2024-10-29 13:43
Severity ?
EPSS score ?
Summary
When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAP_SE | SAP S/4HANA (Manage Journal Entry Template) |
Version: S4CORE 104 Version: 105 Version: 106 Version: 107 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T16:30:45.390Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://me.sap.com/notes/3341211" }, { "tags": [ "x_transferred" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-35870", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-25T18:38:35.831454Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-29T13:43:24.084Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "SAP S/4HANA (Manage Journal Entry Template)", "vendor": "SAP_SE", "versions": [ { "status": "affected", "version": "S4CORE 104" }, { "status": "affected", "version": "105" }, { "status": "affected", "version": "106" }, { "status": "affected", "version": "107" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eWhen creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable.\u003c/p\u003e" } ], "value": "When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732: Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-28T21:59:09.148Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://me.sap.com/notes/3341211" }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Improper Access Control in SAP S/4HANA (Manage Journal Entry Template)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2023-35870", "datePublished": "2023-07-11T02:40:26.084Z", "dateReserved": "2023-06-19T10:27:44.579Z", "dateUpdated": "2024-10-29T13:43:24.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29110
Vulnerability from cvelistv5
Published
2023-04-11 03:00
Modified
2024-08-02 14:00
Severity ?
EPSS score ?
Summary
The SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAP | Application Interface Framework (Message Dashboard) |
Version: AIF 703 Version: AIFX 702 Version: S4CORE 100 Version: S4CORE 101 Version: SAP_BASIS 755 Version: SAP_BASIS 756 Version: SAP_ABA 75C Version: SAP_ABA 75D Version: SAP_ABA 75E |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:15.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/3113349" }, { "tags": [ "x_transferred" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Application Interface Framework (Message Dashboard)", "vendor": "SAP", "versions": [ { "status": "affected", "version": "AIF 703" }, { "status": "affected", "version": "AIFX 702" }, { "status": "affected", "version": "S4CORE 100" }, { "status": "affected", "version": "S4CORE 101" }, { "status": "affected", "version": "SAP_BASIS 755" }, { "status": "affected", "version": "SAP_BASIS 756" }, { "status": "affected", "version": "SAP_ABA 75C" }, { "status": "affected", "version": "SAP_ABA 75D" }, { "status": "affected", "version": "SAP_ABA 75E" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.\u003c/p\u003e" } ], "value": "The SAP Application Interface (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 100, 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows the usage HTML tags. An authorized attacker can use some of the basic HTML codes such as heading, basic formatting and lists, then an attacker can inject images from the foreign domains. After successful exploitations, an attacker can cause limited impact on the confidentiality and integrity of the application.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "eng", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T20:17:48.094Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://launchpad.support.sap.com/#/notes/3113349" }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Code Injection vulnerability in SAP Application Interface Framework (Message Dashboard)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2023-29110", "datePublished": "2023-04-11T03:00:17.210Z", "dateReserved": "2023-03-31T10:01:53.360Z", "dateUpdated": "2024-08-02T14:00:15.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-29109
Vulnerability from cvelistv5
Published
2023-04-11 02:58
Modified
2024-08-02 14:00
Severity ?
EPSS score ?
Summary
The SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAP | Application Interface Framework (Message Dashboard) |
Version: AIF 703 Version: AIFX 702 Version: S4CORE 101 Version: SAP_BASIS 755 Version: SAP_BASIS 756 Version: SAP_ABA 75C Version: SAP_ABA 75D Version: SAP_ABA 75E |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:00:15.862Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/3115598" }, { "tags": [ "x_transferred" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Application Interface Framework (Message Dashboard)", "vendor": "SAP", "versions": [ { "status": "affected", "version": "AIF 703" }, { "status": "affected", "version": "AIFX 702" }, { "status": "affected", "version": "S4CORE 101" }, { "status": "affected", "version": "SAP_BASIS 755" }, { "status": "affected", "version": "SAP_BASIS 756" }, { "status": "affected", "version": "SAP_ABA 75C" }, { "status": "affected", "version": "SAP_ABA 75D" }, { "status": "affected", "version": "SAP_ABA 75E" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThe SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.\u003c/p\u003e" } ], "value": "The SAP Application Interface Framework (Message Dashboard) - versions AIF 703, AIFX 702, S4CORE 101, SAP_BASIS 755, 756, SAP_ABA 75C, 75D, 75E, application allows an Excel formula injection. An authorized attacker can inject arbitrary Excel formulas into fields like the Tooltip of the Custom Hints List. Once the victim opens the downloaded Excel document, the formula will be executed. As a result, an attacker can cause limited impact on the confidentiality and integrity of the application.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-1236", "description": "CWE-1236: Improper Neutralization of Formula Elements in a CSV File", "lang": "eng", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T20:17:39.130Z", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "url": "https://launchpad.support.sap.com/#/notes/3115598" }, { "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "source": { "discovery": "UNKNOWN" }, "title": "Code Injection vulnerability in SAP Application Interface Framework (Message Dashboard)", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2023-29109", "datePublished": "2023-04-11T02:58:49.648Z", "dateReserved": "2023-03-31T10:01:53.360Z", "dateUpdated": "2024-08-02T14:00:15.862Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-2419
Vulnerability from cvelistv5
Published
2018-05-09 20:00
Modified
2024-08-05 04:21
Severity ?
EPSS score ?
Summary
SAP Enterprise Financial Services (SAPSCORE 1.11, 1.12; S4CORE 1.01, 1.02; EA-FINSERV 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
References
▼ | URL | Tags |
---|---|---|
https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/ | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104116 | vdb-entry, x_refsource_BID | |
https://launchpad.support.sap.com/#/notes/2596627 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | SAP SE | SAP Enterprise Financial Services (SAPSCORE) |
Version: 1.11 Version: 1.12 |
||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:21:33.627Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/" }, { "name": "104116", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104116" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2596627" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP Enterprise Financial Services (SAPSCORE)", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "1.11" }, { "status": "affected", "version": "1.12" } ] }, { "product": "SAP Enterprise Financial Services (S4CORE)", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "1.01" }, { "status": "affected", "version": "1.02" } ] }, { "product": "SAP Enterprise Financial Services (EA-FINSERV)", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "6.04" }, { "status": "affected", "version": "6.05" }, { "status": "affected", "version": "6.06" }, { "status": "affected", "version": "6.16" }, { "status": "affected", "version": "6.17" }, { "status": "affected", "version": "6.18" }, { "status": "affected", "version": "8.0" } ] } ], "datePublic": "2018-05-09T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP Enterprise Financial Services (SAPSCORE 1.11, 1.12; S4CORE 1.01, 1.02; EA-FINSERV 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Missing Authorization Check", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-10T09:57:01", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/" }, { "name": "104116", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104116" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/2596627" } ], "source": { "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2018-2419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP Enterprise Financial Services (SAPSCORE)", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.11" }, { "version_affected": "=", "version_value": "1.12" } ] } }, { "product_name": "SAP Enterprise Financial Services (S4CORE)", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.01" }, { "version_affected": "=", "version_value": "1.02" } ] } }, { "product_name": "SAP Enterprise Financial Services (EA-FINSERV)", "version": { "version_data": [ { "version_affected": "=", "version_value": "6.04" }, { "version_affected": "=", "version_value": "6.05" }, { "version_affected": "=", "version_value": "6.06" }, { "version_affected": "=", "version_value": "6.16" }, { "version_affected": "=", "version_value": "6.17" }, { "version_affected": "=", "version_value": "6.18" }, { "version_affected": "=", "version_value": "8.0" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP Enterprise Financial Services (SAPSCORE 1.11, 1.12; S4CORE 1.01, 1.02; EA-FINSERV 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Missing Authorization Check" } ] } ] }, "references": { "reference_data": [ { "name": "https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/", "refsource": "CONFIRM", "url": "https://blogs.sap.com/2018/05/08/sap-security-patch-day-may-2018/" }, { "name": "104116", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104116" }, { "name": "https://launchpad.support.sap.com/#/notes/2596627", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/2596627" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2018-2419", "datePublished": "2018-05-09T20:00:00", "dateReserved": "2017-12-15T00:00:00", "dateUpdated": "2024-08-05T04:21:33.627Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }