CVE-2024-42373 (GCVE-0-2024-42373)

Vulnerability from cvelistv5 – Published: 2024-08-13 04:53 – Updated: 2024-08-14 16:43
VLAI?
Summary
SAP Student Life Cycle Management (SLcM) fails to conduct proper authorization checks for authenticated users, leading to the potential escalation of privileges. On successful exploitation it could allow an attacker to delete non-sensitive report variants that are typically restricted, causing minimal impact on the integrity of the application.
CWE
Assigner
sap
Impacted products
Vendor Product Version
SAP_SE SAP Student Life Cycle Management (SLcM) Affected: 617
Affected: 618
Affected: 802
Affected: 803
Affected: 804
Affected: 805
Affected: 806
Affected: 807
Affected: 808
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42373",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T16:43:37.656398Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-14T16:43:46.761Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SAP Student Life Cycle Management (SLcM)",
          "vendor": "SAP_SE",
          "versions": [
            {
              "status": "affected",
              "version": "617"
            },
            {
              "status": "affected",
              "version": "618"
            },
            {
              "status": "affected",
              "version": "802"
            },
            {
              "status": "affected",
              "version": "803"
            },
            {
              "status": "affected",
              "version": "804"
            },
            {
              "status": "affected",
              "version": "805"
            },
            {
              "status": "affected",
              "version": "806"
            },
            {
              "status": "affected",
              "version": "807"
            },
            {
              "status": "affected",
              "version": "808"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eSAP Student Life Cycle Management (SLcM) fails to conduct proper authorization checks for authenticated users, leading to the potential escalation of privileges. On successful exploitation it could allow an attacker to delete non-sensitive report variants that are typically restricted, causing minimal impact on the integrity of the application.\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;\u003c/span\u003e"
            }
          ],
          "value": "SAP Student Life Cycle Management (SLcM) fails to conduct proper authorization checks for authenticated users, leading to the potential escalation of privileges. On successful exploitation it could allow an attacker to delete non-sensitive report variants that are typically restricted, causing minimal impact on the integrity of the application."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-862",
              "description": "CWE-862: Missing Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T04:53:09.327Z",
        "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
        "shortName": "sap"
      },
      "references": [
        {
          "url": "https://me.sap.com/notes/3479293"
        },
        {
          "url": "https://url.sap/sapsecuritypatchday"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Missing Authorization Check in SAP Student Life Cycle Management (SLcM)",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
    "assignerShortName": "sap",
    "cveId": "CVE-2024-42373",
    "datePublished": "2024-08-13T04:53:09.327Z",
    "dateReserved": "2024-07-31T04:09:36.223Z",
    "dateUpdated": "2024-08-14T16:43:46.761Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:student_life_cycle_management:617:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"49D1564B-9F48-442C-B521-B79A982B6010\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:student_life_cycle_management:618:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9630E381-1579-4D71-B49D-1079A31E3A63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:student_life_cycle_management:802:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B60BA131-5DA5-409F-806A-641A7BBB9D33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:student_life_cycle_management:803:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CE9F776-1B68-4ABA-850E-44DB58C2F616\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:student_life_cycle_management:804:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA4A7443-E21B-4EAE-A4EC-E3B9A8908FBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:student_life_cycle_management:805:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6025F055-0E0E-41A3-BE2D-95229710FB1D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:student_life_cycle_management:806:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C49CAC0-C207-4BC6-AE05-65645B54011C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:student_life_cycle_management:807:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"463C241E-928C-4FE8-993D-F09E6F4EEC69\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:student_life_cycle_management:808:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F34FAC4C-4E0A-4E80-8276-E7DA12EC5BF3\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"SAP Student Life Cycle Management (SLcM) fails to conduct proper authorization checks for authenticated users, leading to the potential escalation of privileges. On successful exploitation it could allow an attacker to delete non-sensitive report variants that are typically restricted, causing minimal impact on the integrity of the application.\"}, {\"lang\": \"es\", \"value\": \"SAP Student Life Cycle Management (SLcM) no realiza comprobaciones de autorizaci\\u00f3n adecuadas para los usuarios autenticados, lo que genera una posible escalada de privilegios. Si se explota con \\u00e9xito, podr\\u00eda permitir a un atacante eliminar variantes de informes no confidenciales que normalmente est\\u00e1n restringidas, causando un impacto m\\u00ednimo en la integridad de la aplicaci\\u00f3n.\"}]",
      "id": "CVE-2024-42373",
      "lastModified": "2024-09-12T13:26:37.753",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"cna@sap.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\", \"baseScore\": 4.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L\", \"baseScore\": 5.4, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.5}]}",
      "published": "2024-08-13T05:15:13.800",
      "references": "[{\"url\": \"https://me.sap.com/notes/3479293\", \"source\": \"cna@sap.com\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://url.sap/sapsecuritypatchday\", \"source\": \"cna@sap.com\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "cna@sap.com",
      "vulnStatus": "Analyzed",
      "weaknesses": "[{\"source\": \"cna@sap.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-862\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-42373\",\"sourceIdentifier\":\"cna@sap.com\",\"published\":\"2024-08-13T05:15:13.800\",\"lastModified\":\"2024-09-12T13:26:37.753\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SAP Student Life Cycle Management (SLcM) fails to conduct proper authorization checks for authenticated users, leading to the potential escalation of privileges. On successful exploitation it could allow an attacker to delete non-sensitive report variants that are typically restricted, causing minimal impact on the integrity of the application.\"},{\"lang\":\"es\",\"value\":\"SAP Student Life Cycle Management (SLcM) no realiza comprobaciones de autorizaci\u00f3n adecuadas para los usuarios autenticados, lo que genera una posible escalada de privilegios. Si se explota con \u00e9xito, podr\u00eda permitir a un atacante eliminar variantes de informes no confidenciales que normalmente est\u00e1n restringidas, causando un impacto m\u00ednimo en la integridad de la aplicaci\u00f3n.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@sap.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":4.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"cna@sap.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:student_life_cycle_management:617:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49D1564B-9F48-442C-B521-B79A982B6010\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:student_life_cycle_management:618:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9630E381-1579-4D71-B49D-1079A31E3A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:student_life_cycle_management:802:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B60BA131-5DA5-409F-806A-641A7BBB9D33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:student_life_cycle_management:803:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CE9F776-1B68-4ABA-850E-44DB58C2F616\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:student_life_cycle_management:804:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA4A7443-E21B-4EAE-A4EC-E3B9A8908FBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:student_life_cycle_management:805:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6025F055-0E0E-41A3-BE2D-95229710FB1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:student_life_cycle_management:806:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C49CAC0-C207-4BC6-AE05-65645B54011C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:student_life_cycle_management:807:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"463C241E-928C-4FE8-993D-F09E6F4EEC69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:student_life_cycle_management:808:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F34FAC4C-4E0A-4E80-8276-E7DA12EC5BF3\"}]}]}],\"references\":[{\"url\":\"https://me.sap.com/notes/3479293\",\"source\":\"cna@sap.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://url.sap/sapsecuritypatchday\",\"source\":\"cna@sap.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-42373\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-14T16:43:37.656398Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-14T16:43:43.197Z\"}}], \"cna\": {\"title\": \"Missing Authorization Check in SAP Student Life Cycle Management (SLcM)\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"SAP_SE\", \"product\": \"SAP Student Life Cycle Management (SLcM)\", \"versions\": [{\"status\": \"affected\", \"version\": \"617\"}, {\"status\": \"affected\", \"version\": \"618\"}, {\"status\": \"affected\", \"version\": \"802\"}, {\"status\": \"affected\", \"version\": \"803\"}, {\"status\": \"affected\", \"version\": \"804\"}, {\"status\": \"affected\", \"version\": \"805\"}, {\"status\": \"affected\", \"version\": \"806\"}, {\"status\": \"affected\", \"version\": \"807\"}, {\"status\": \"affected\", \"version\": \"808\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://me.sap.com/notes/3479293\"}, {\"url\": \"https://url.sap/sapsecuritypatchday\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"SAP Student Life Cycle Management (SLcM) fails to conduct proper authorization checks for authenticated users, leading to the potential escalation of privileges. On successful exploitation it could allow an attacker to delete non-sensitive report variants that are typically restricted, causing minimal impact on the integrity of the application.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eSAP Student Life Cycle Management (SLcM) fails to conduct proper authorization checks for authenticated users, leading to the potential escalation of privileges. On successful exploitation it could allow an attacker to delete non-sensitive report variants that are typically restricted, causing minimal impact on the integrity of the application.\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;\u003c/span\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-862\", \"description\": \"CWE-862: Missing Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"e4686d1a-f260-4930-ac4c-2f5c992778dd\", \"shortName\": \"sap\", \"dateUpdated\": \"2024-08-13T04:53:09.327Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-42373\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-14T16:43:46.761Z\", \"dateReserved\": \"2024-07-31T04:09:36.223Z\", \"assignerOrgId\": \"e4686d1a-f260-4930-ac4c-2f5c992778dd\", \"datePublished\": \"2024-08-13T04:53:09.327Z\", \"assignerShortName\": \"sap\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…