fkie_cve-2018-2484
Vulnerability from fkie_nvd
Published
2019-01-08 20:29
Modified
2024-11-21 04:03
Severity ?
Summary
SAP Enterprise Financial Services (fixed in SAPSCORE 1.13, 1.14, 1.15; S4CORE 1.01, 1.02, 1.03; EA-FINSERV 1.10, 2.0, 5.0, 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0; Bank/CFM 4.63_20) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.
References
▼ | URL | Tags | |
---|---|---|---|
cna@sap.com | http://www.securityfocus.com/bid/106477 | Third Party Advisory, VDB Entry | |
cna@sap.com | https://launchpad.support.sap.com/#/notes/2662687 | Permissions Required, Vendor Advisory | |
cna@sap.com | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/106477 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/2662687 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sap | sapscore | 1.13 | |
sap | sapscore | 1.14 | |
sap | sapscore | 1.15 | |
sap | s4core | 1.01 | |
sap | s4core | 1.02 | |
sap | s4core | 1.03 | |
sap | ea-finserv | 1.10 | |
sap | ea-finserv | 2.0 | |
sap | ea-finserv | 5.0 | |
sap | ea-finserv | 6.0 | |
sap | ea-finserv | 6.03 | |
sap | ea-finserv | 6.04 | |
sap | ea-finserv | 6.05 | |
sap | ea-finserv | 6.06 | |
sap | ea-finserv | 6.16 | |
sap | ea-finserv | 6.17 | |
sap | ea-finserv | 6.18 | |
sap | ea-finserv | 8.0 | |
sap | bank\/cfm | 4.63_20 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:sap:sapscore:1.13:*:*:*:*:*:*:*", matchCriteriaId: "A7F34FFD-52D4-4137-ACFF-E1D1A5961BC5", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:sapscore:1.14:*:*:*:*:*:*:*", matchCriteriaId: "65BB7CFD-A663-451E-A8E8-8ACD00DAC03D", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:sapscore:1.15:*:*:*:*:*:*:*", matchCriteriaId: "E3C233D8-6DCC-4723-ACC7-E259412E0D95", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:sap:s4core:1.01:*:*:*:*:*:*:*", matchCriteriaId: "A80D9723-2BD5-4861-AAC8-C476AE1D6957", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:s4core:1.02:*:*:*:*:*:*:*", matchCriteriaId: "FCD8AB6B-B411-4336-9DD7-50D9E1C94FC2", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:s4core:1.03:*:*:*:*:*:*:*", matchCriteriaId: "17AEBFBA-0E6B-44C9-8E2B-18823944025E", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:sap:ea-finserv:1.10:*:*:*:*:*:*:*", matchCriteriaId: "03E5225C-6CEA-4D9C-9F39-5FC5C3FBF9BA", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:ea-finserv:2.0:*:*:*:*:*:*:*", matchCriteriaId: "DF0A8603-FE03-4E19-A41A-CD512C64411A", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:ea-finserv:5.0:*:*:*:*:*:*:*", matchCriteriaId: "4225331D-D4A6-4C4B-81CA-AEA5E9752B81", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:ea-finserv:6.0:*:*:*:*:*:*:*", matchCriteriaId: "7D988C6A-FFA9-4674-8F4D-D5CF944A2EAA", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:ea-finserv:6.03:*:*:*:*:*:*:*", matchCriteriaId: "B1FF1A3A-2030-4690-875C-5FB11EA69FEE", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:ea-finserv:6.04:*:*:*:*:*:*:*", matchCriteriaId: "F7B8824B-A919-40E3-82EC-291445014BE8", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:ea-finserv:6.05:*:*:*:*:*:*:*", matchCriteriaId: "DE5119FD-7E2F-4ECC-9DA9-706FABE46EC8", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:ea-finserv:6.06:*:*:*:*:*:*:*", matchCriteriaId: "4C0060F4-07EB-4B11-A5FE-C6981FBB6458", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:ea-finserv:6.16:*:*:*:*:*:*:*", matchCriteriaId: "A3F343C6-A992-49E9-B7FC-8E0CE24F4338", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:ea-finserv:6.17:*:*:*:*:*:*:*", matchCriteriaId: "3ABAF511-4A30-4AD1-9C38-EDB9ECBCEEC0", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:ea-finserv:6.18:*:*:*:*:*:*:*", matchCriteriaId: "B4EDC68A-4DA0-4399-A3CF-A41B7E425E1D", vulnerable: true, }, { criteria: "cpe:2.3:a:sap:ea-finserv:8.0:*:*:*:*:*:*:*", matchCriteriaId: "5ECD565C-751A-40D4-831D-4012CE388CDA", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:sap:bank\\/cfm:4.63_20:*:*:*:*:*:*:*", matchCriteriaId: "978F7B9F-490A-4506-B340-314774D4AFF5", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "SAP Enterprise Financial Services (fixed in SAPSCORE 1.13, 1.14, 1.15; S4CORE 1.01, 1.02, 1.03; EA-FINSERV 1.10, 2.0, 5.0, 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0; Bank/CFM 4.63_20) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges.", }, { lang: "es", value: "SAP Enterprise Financial Services (solucionado en SAPSCORE 1.13, 1.14, 1.15; S4CORE 1.01, 1.02, 1.03; EA-FINSERV 1.10, 2.0, 5.0, 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0; Bank/CFM 4.63_20) no realiza las comprobaciones necesarias de autorización para un usuario autenticado, lo que resulta en un escalado de privilegios.", }, ], id: "CVE-2018-2484", lastModified: "2024-11-21T04:03:54.007", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "PARTIAL", baseScore: 6.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 8, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2019-01-08T20:29:00.297", references: [ { source: "cna@sap.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106477", }, { source: "cna@sap.com", tags: [ "Permissions Required", "Vendor Advisory", ], url: "https://launchpad.support.sap.com/#/notes/2662687", }, { source: "cna@sap.com", tags: [ "Vendor Advisory", ], url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/106477", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Permissions Required", "Vendor Advisory", ], url: "https://launchpad.support.sap.com/#/notes/2662687", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985", }, ], sourceIdentifier: "cna@sap.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-862", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.