FKIE_CVE-2024-39597
Vulnerability from fkie_nvd - Published: 2024-07-09 04:15 - Updated: 2024-11-21 09:28
Severity ?
Summary
In SAP Commerce, a user can misuse the forgotten
password functionality to gain access to a Composable Storefront B2B site for
which early login and registration is activated, without requiring the merchant
to approve the account beforehand. If the site is not configured as isolated
site, this can also grant access to other non-isolated early login sites, even
if registration is not enabled for those other sites.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In SAP Commerce, a user can misuse the forgotten\npassword functionality to gain access to a Composable Storefront B2B site for\nwhich early login and registration is activated, without requiring the merchant\nto approve the account beforehand. If the site is not configured as isolated\nsite, this can also grant access to other non-isolated early login sites, even\nif registration is not enabled for those other sites."
},
{
"lang": "es",
"value": "En SAP Commerce, un usuario puede hacer un mal uso de la funcionalidad de contrase\u00f1a olvidada para obtener acceso a un sitio B2B de Composable Storefront para el cual se activa el inicio de sesi\u00f3n y el registro temprano, sin requerir que el comerciante apruebe la cuenta de antemano. Si el sitio no est\u00e1 configurado como sitio aislado, esto tambi\u00e9n puede otorgar acceso a otros sitios de inicio de sesi\u00f3n temprano no aislados, incluso si el registro no est\u00e1 habilitado para esos otros sitios."
}
],
"id": "CVE-2024-39597",
"lastModified": "2024-11-21T09:28:05.280",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7,
"source": "cna@sap.com",
"type": "Secondary"
}
]
},
"published": "2024-07-09T04:15:13.963",
"references": [
{
"source": "cna@sap.com",
"url": "https://me.sap.com/notes/3490515"
},
{
"source": "cna@sap.com",
"url": "https://url.sap/sapsecuritypatchday"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://me.sap.com/notes/3490515"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://url.sap/sapsecuritypatchday"
}
],
"sourceIdentifier": "cna@sap.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-285"
}
],
"source": "cna@sap.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…