CVE-2022-22534
Vulnerability from cvelistv5
Published
2022-02-09 22:05
Modified
2024-08-03 03:14
Severity ?
EPSS score ?
Summary
Due to insufficient encoding of user input, SAP NetWeaver allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password. These endpoints are normally exposed over the network and successful exploitation can partially impact confidentiality of the application.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | SAP SE | SAP NetWeaver (ABAP and Java application Servers) |
Version: 700 Version: 701 Version: 702 Version: 731 Version: 740 Version: 750 Version: 751 Version: 752 Version: 753 Version: 754 Version: 755 Version: 756 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:14:55.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/3124994" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP NetWeaver (ABAP and Java application Servers)", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "700" }, { "status": "affected", "version": "701" }, { "status": "affected", "version": "702" }, { "status": "affected", "version": "731" }, { "status": "affected", "version": "740" }, { "status": "affected", "version": "750" }, { "status": "affected", "version": "751" }, { "status": "affected", "version": "752" }, { "status": "affected", "version": "753" }, { "status": "affected", "version": "754" }, { "status": "affected", "version": "755" }, { "status": "affected", "version": "756" } ] } ], "descriptions": [ { "lang": "en", "value": "Due to insufficient encoding of user input, SAP NetWeaver allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password. These endpoints are normally exposed over the network and successful exploitation can partially impact confidentiality of the application." } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-24T15:18:07", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/3124994" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2022-22534", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP NetWeaver (ABAP and Java application Servers)", "version": { "version_data": [ { "version_affected": "=", "version_value": "700" }, { "version_affected": "=", "version_value": "701" }, { "version_affected": "=", "version_value": "702" }, { "version_affected": "=", "version_value": "731" }, { "version_affected": "=", "version_value": "740" }, { "version_affected": "=", "version_value": "750" }, { "version_affected": "=", "version_value": "751" }, { "version_affected": "=", "version_value": "752" }, { "version_affected": "=", "version_value": "753" }, { "version_affected": "=", "version_value": "754" }, { "version_affected": "=", "version_value": "755" }, { "version_affected": "=", "version_value": "756" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Due to insufficient encoding of user input, SAP NetWeaver allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password. These endpoints are normally exposed over the network and successful exploitation can partially impact confidentiality of the application." } ] }, "impact": { "cvss": { "baseScore": "null", "vectorString": "null", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://launchpad.support.sap.com/#/notes/3124994", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/3124994" }, { "name": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", "refsource": "MISC", "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2022-22534", "datePublished": "2022-02-09T22:05:21", "dateReserved": "2022-01-04T00:00:00", "dateUpdated": "2024-08-03T03:14:55.475Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:netweaver:700:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7FED49E-6F9A-494A-9226-1059249960A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:netweaver:701:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4836C36D-242F-4818-81B4-C170959D02F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:netweaver:702:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A503ABF-8655-40D7-96AD-2D7F19A673AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:netweaver:731:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A9D5C5A-6963-438B-B0EA-2A621A34D8A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:netweaver:740:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BFFA1591-0304-4FAE-A6A7-72D04D1F41A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:netweaver:750:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7940A9AF-308E-4CE5-BA19-7A3DCF49F644\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:netweaver:751:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C09428E4-45BB-414D-9F3D-AA5C73D2DD5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:netweaver:752:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5ED0BA7D-939D-4B05-81A3-9F991C8C04F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:netweaver:753:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C2BF545-A7DC-4BB6-B894-D04CF163DD88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:netweaver:754:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A75B2F18-60BE-41B5-82CB-520F794F2004\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:netweaver:755:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E31620E5-30FC-4545-A430-AAA77A66B51A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:netweaver:756:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9724E131-9893-4630-96A2-EB6032D98C58\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Due to insufficient encoding of user input, SAP NetWeaver allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password. These endpoints are normally exposed over the network and successful exploitation can partially impact confidentiality of the application.\"}, {\"lang\": \"es\", \"value\": \"Debido a una codificaci\\u00f3n insuficiente de la entrada del usuario, SAP NetWeaver permite a un atacante no autenticado inyectar c\\u00f3digo que puede exponer datos confidenciales como el ID de usuario y la contrase\\u00f1a. Estos endpoints est\\u00e1n normalmente expuestos a trav\\u00e9s de la red y una explotaci\\u00f3n con \\u00e9xito puede impactar parcialmente la confidencialidad de la aplicaci\\u00f3n\"}]", "id": "CVE-2022-22534", "lastModified": "2024-11-21T06:46:58.527", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}", "published": "2022-02-09T23:15:18.533", "references": "[{\"url\": \"https://launchpad.support.sap.com/#/notes/3124994\", \"source\": \"cna@sap.com\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html\", \"source\": \"cna@sap.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://launchpad.support.sap.com/#/notes/3124994\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2022-22534\",\"sourceIdentifier\":\"cna@sap.com\",\"published\":\"2022-02-09T23:15:18.533\",\"lastModified\":\"2024-11-21T06:46:58.527\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Due to insufficient encoding of user input, SAP NetWeaver allows an unauthenticated attacker to inject code that may expose sensitive data like user ID and password. These endpoints are normally exposed over the network and successful exploitation can partially impact confidentiality of the application.\"},{\"lang\":\"es\",\"value\":\"Debido a una codificaci\u00f3n insuficiente de la entrada del usuario, SAP NetWeaver permite a un atacante no autenticado inyectar c\u00f3digo que puede exponer datos confidenciales como el ID de usuario y la contrase\u00f1a. Estos endpoints est\u00e1n normalmente expuestos a trav\u00e9s de la red y una explotaci\u00f3n con \u00e9xito puede impactar parcialmente la confidencialidad de la aplicaci\u00f3n\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:netweaver:700:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7FED49E-6F9A-494A-9226-1059249960A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:netweaver:701:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4836C36D-242F-4818-81B4-C170959D02F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:netweaver:702:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A503ABF-8655-40D7-96AD-2D7F19A673AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:netweaver:731:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A9D5C5A-6963-438B-B0EA-2A621A34D8A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:netweaver:740:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFFA1591-0304-4FAE-A6A7-72D04D1F41A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:netweaver:750:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7940A9AF-308E-4CE5-BA19-7A3DCF49F644\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:netweaver:751:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C09428E4-45BB-414D-9F3D-AA5C73D2DD5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:netweaver:752:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5ED0BA7D-939D-4B05-81A3-9F991C8C04F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:netweaver:753:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C2BF545-A7DC-4BB6-B894-D04CF163DD88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:netweaver:754:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A75B2F18-60BE-41B5-82CB-520F794F2004\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:netweaver:755:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E31620E5-30FC-4545-A430-AAA77A66B51A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:netweaver:756:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9724E131-9893-4630-96A2-EB6032D98C58\"}]}]}],\"references\":[{\"url\":\"https://launchpad.support.sap.com/#/notes/3124994\",\"source\":\"cna@sap.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html\",\"source\":\"cna@sap.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://launchpad.support.sap.com/#/notes/3124994\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.