var-201410-1202
Vulnerability from variot

Business Warehouse (BW) in SAP Netweaver AS ABAP 7.31 allows remote authenticated users to obtain sensitive information via a request to the RSDU_CCMS_GET_PROFILE_PARAM RFC function. Supplementary information : CWE Vulnerability type by CWE-285: Improper Authorization ( Inappropriate authentication ) Has been identified. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and gain unauthorized access. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1

Onapsis Security Advisory 2014-033: SAP Business Warehouse Missing Authorization Check

1. Impact on Business

By exploiting this vulnerability an authenticated attacker will be able to abuse of functionality that should be restricted and can disclose technical information without having the right access permissions. This information could be used to perform further attacks over the platform.

Risk Level: Low

2. Advisory Information

    • Public Release Date: 2014-10-08
    • Subscriber Notification Date: 2014-10-08
    • Last Revised: 2014-08-17
    • Security Advisory ID: ONAPSIS-2013-033
    • Onapsis SVS ID: ONAPSIS-00114
    • Researcher: Nahuel D. S\xe1nchez
    • Initial Base CVSS v2: 3.5 (AV:N/AC:M/AU:S/C:P/I:N/A:N)

3. Vulnerability Information

    • Vendor: SAP
    • Affected Components:
  • SAP Netweaver AS ABAP 7.31 (Check SAP Note 1967780 for detailed information on affected releases)

    • Vulnerability Class: Improper Authorization (CWE-285)
    • Remotely Exploitable: Yes
    • Locally Exploitable: No
    • Authentication Required: Yes
    • Detection Module available in Onapsis X1: Yes
    • BizRisk Illustration Module available in Onapsis X1: Yes
    • Original Advisory: http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-033

4. Affected Components Description

SAP NetWeaver Business Warehouse is a platform that provides business intelligence, analytical, reporting and data warehousing capabilities. It is often used by companies who run their business on SAP's operational systems. BW is part of the SAP NetWeaver platform.

5. Vulnerability Details

The RFC function 'RSDU_CCMS_GET_PROFILE_PARAM' does not perform any authorization check prior to retrieving the profile parameter value.

6. Solution

SAP has released SAP Note 1967780 which provide patched versions of the affected components.

The patches can be downloaded from https://service.sap.com/sap/support/notes/1967780.

Onapsis strongly recommends SAP customers to download the related security fixes and apply them to the affected components in order to reduce business risks.

  1. 2014-06-10: SAP releases security patches. 2014-10-08: Onapsis notifies availability of security advisory.

About Onapsis Research Labs

Onapsis Research Labs provides the industry analysis of key security issues that impact business-critical systems and applications. Delivering frequent and timely security and compliance advisories with associated risk levels, Onapsis Research Labs combine in-depth knowledge and experience to deliver technical and business-context with sound security judgment to the broader information security community.

About Onapsis, Inc.

Onapsis gives organizations the adaptive advantage to succeed in securing business-critical applications by combining technology, research and analytics. Onapsis enables every security and compliance team an adaptive approach to focus on the factors that matter most to their business ? critical applications that house vital data and run business processes.

Onapsis provides technology solutions including Onapsis X1, the de-facto SAP security auditing tool which delivers enterprise vulnerability, compliance, detection and response capabilities with analytics. The Onapsis Research Labs provide subject matter expertise that combines in-depth knowledge and experience to deliver technical and business-context with sound security judgment. This enables organizations to efficiently uncover security and compliance gaps and prioritize the resolution within applications running on SAP platforms.

Onapsis delivers tangible business results including decreased business risk, highlighted compliance gaps, lower operational security costs and demonstrable value on investment. For further information about our solutions, please contact us at info@onapsis.com and visit our website at www.onapsis.com. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) Comment: Onapsis Research Team

iEYEARECAAYFAlQ1Q14ACgkQz3i6WNVBcDWY/QCeI9z7i+dPN5uzqebPIrFtswz7 tVgAnidtdPUOtcAvKJu9UHgUH/L6afCl =piFM -----END PGP SIGNATURE-----

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201410-1202",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netweaver abap",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "sap",
        "version": "7.31"
      },
      {
        "model": "netweaver business warehouse",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sap",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "70292"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004933"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-8312"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201410-581"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:sap:netweaver_abap:7.31:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-8312"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Nahuel D. S\u00e1nchez",
    "sources": [
      {
        "db": "BID",
        "id": "70292"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2014-8312",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "SINGLE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 6.8,
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "LOW",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "Single",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 3.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2014-8312",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Low",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2014-8312",
            "trust": 1.8,
            "value": "LOW"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201410-581",
            "trust": 0.6,
            "value": "LOW"
          },
          {
            "author": "VULMON",
            "id": "CVE-2014-8312",
            "trust": 0.1,
            "value": "LOW"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2014-8312"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004933"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-8312"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201410-581"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Business Warehouse (BW) in SAP Netweaver AS ABAP 7.31 allows remote authenticated users to obtain sensitive information via a request to the RSDU_CCMS_GET_PROFILE_PARAM RFC function. Supplementary information : CWE Vulnerability type by CWE-285: Improper Authorization ( Inappropriate authentication ) Has been identified. \nSuccessfully exploiting this issue may allow an attacker to bypass certain security restrictions and gain unauthorized access. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nOnapsis Security Advisory 2014-033: SAP Business Warehouse Missing\nAuthorization Check\n\n1. Impact on Business             \n=====================\n\nBy exploiting this vulnerability an authenticated attacker will be able\nto abuse of functionality that should be restricted and can disclose\ntechnical information without having the right access permissions. This\ninformation could be used to perform further attacks over the platform. \n\nRisk Level: Low\n\n\n2. Advisory Information\n=======================\n\n- - Public Release Date: 2014-10-08\n\n- - Subscriber Notification Date: 2014-10-08\n \n- - Last Revised: 2014-08-17\n\n- - Security Advisory ID: ONAPSIS-2013-033\n\n- - Onapsis SVS ID: ONAPSIS-00114\n\n- - Researcher: Nahuel D. S\\xe1nchez\n\n- - Initial Base CVSS v2:  3.5 (AV:N/AC:M/AU:S/C:P/I:N/A:N)\n\n\n3. Vulnerability Information\n============================\n\n- - Vendor: SAP\n\n- - Affected Components:\n\n - SAP Netweaver AS ABAP 7.31\n  (Check SAP Note 1967780 for detailed information on affected releases)\n\n- - Vulnerability Class: Improper Authorization (CWE-285)\n\n- - Remotely Exploitable: Yes\n\n- - Locally Exploitable: No\n\n- - Authentication Required: Yes\n\n- - Detection Module available in Onapsis X1: Yes\n\n- - BizRisk Illustration Module available in Onapsis X1: Yes\n\n- - Original Advisory:\nhttp://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-033\n\n\n4. Affected Components Description\n==================================\n\nSAP NetWeaver Business Warehouse is a platform that provides business\nintelligence, analytical, reporting and data warehousing capabilities. \nIt is often used by companies who run their business on SAP\u0027s\noperational systems. BW is part of the SAP NetWeaver platform. \n\n\n5. Vulnerability Details\n========================\n\nThe RFC function \u0027RSDU_CCMS_GET_PROFILE_PARAM\u0027 does not perform any\nauthorization check prior to retrieving the profile parameter value. \n\n\n6. Solution\n===========\n\nSAP has released SAP Note 1967780 which provide patched versions of the\naffected components. \n\nThe patches can be downloaded from\nhttps://service.sap.com/sap/support/notes/1967780. \n\nOnapsis strongly recommends SAP customers to download the related\nsecurity fixes and apply them to the affected components in order to\nreduce business risks. \n\n\n7. \n2014-06-10: SAP releases security patches. \n2014-10-08: Onapsis notifies availability of security advisory. \n\n\nAbout Onapsis Research Labs\n===========================\n\nOnapsis Research Labs provides the industry analysis of key security\nissues that impact business-critical systems and applications. \nDelivering frequent and timely security and compliance advisories with\nassociated risk levels, Onapsis Research Labs combine in-depth knowledge\nand experience to deliver technical and business-context with sound\nsecurity judgment to the broader information security community. \n\n\nAbout Onapsis, Inc. \n===================\n\nOnapsis gives organizations the adaptive advantage to succeed in\nsecuring business-critical applications by combining technology,\nresearch and analytics. Onapsis enables every security and compliance\nteam an adaptive approach to focus on the factors that matter most to\ntheir business ? critical applications that house vital data and run\nbusiness processes. \n\nOnapsis provides technology solutions including Onapsis X1, the de-facto\nSAP security auditing tool which delivers enterprise vulnerability,\ncompliance, detection and response capabilities with analytics. \nThe Onapsis Research Labs provide subject matter expertise that combines\nin-depth knowledge and experience to deliver technical and\nbusiness-context with sound security judgment. This enables\norganizations to efficiently uncover security and compliance gaps and\nprioritize the resolution within applications running on SAP platforms. \n\nOnapsis delivers tangible business results including decreased business\nrisk, highlighted compliance gaps, lower operational security costs and\ndemonstrable value on investment. \nFor further information about our solutions, please contact us at\ninfo@onapsis.com and visit our website at www.onapsis.com. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.14 (GNU/Linux)\nComment: Onapsis Research Team\n\niEYEARECAAYFAlQ1Q14ACgkQz3i6WNVBcDWY/QCeI9z7i+dPN5uzqebPIrFtswz7\ntVgAnidtdPUOtcAvKJu9UHgUH/L6afCl\n=piFM\n-----END PGP SIGNATURE-----\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2014-8312"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004933"
      },
      {
        "db": "BID",
        "id": "70292"
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-8312"
      },
      {
        "db": "PACKETSTORM",
        "id": "128603"
      }
    ],
    "trust": 2.07
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2014-8312",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "70292",
        "trust": 2.0
      },
      {
        "db": "PACKETSTORM",
        "id": "128603",
        "trust": 1.8
      },
      {
        "db": "SECUNIA",
        "id": "61101",
        "trust": 1.7
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004933",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201410-581",
        "trust": 0.6
      },
      {
        "db": "VULMON",
        "id": "CVE-2014-8312",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2014-8312"
      },
      {
        "db": "BID",
        "id": "70292"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004933"
      },
      {
        "db": "PACKETSTORM",
        "id": "128603"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-8312"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201410-581"
      }
    ]
  },
  "id": "VAR-201410-1202",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.41666666
  },
  "last_update_date": "2023-12-18T13:34:36.189000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "SAP Security Note 1967780",
        "trust": 0.8,
        "url": "http://scn.sap.com/docs/doc-55451"
      },
      {
        "title": "SAP Netweaver AS ABAP Repair measures for information disclosure vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=209632"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/live-hack-cve/cve-2014-8312 "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2014-8312"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004933"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201410-581"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-Other",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004933"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-8312"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://seclists.org/fulldisclosure/2014/oct/38"
      },
      {
        "trust": 1.8,
        "url": "http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-033"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/bid/70292"
      },
      {
        "trust": 1.7,
        "url": "https://service.sap.com/sap/support/notes/1967780"
      },
      {
        "trust": 1.7,
        "url": "http://scn.sap.com/docs/doc-8218"
      },
      {
        "trust": 1.7,
        "url": "http://packetstormsecurity.com/files/128603/sap-business-warehouse-missing-authorization-check.html"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/61101"
      },
      {
        "trust": 1.7,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/96877"
      },
      {
        "trust": 1.7,
        "url": "http://www.securityfocus.com/archive/1/533645/100/0/threaded"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8312"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8312"
      },
      {
        "trust": 0.3,
        "url": "http://www.sap.com/solutions/technology/data-warehousing/sapnetweaver-business-warehouse/index.epx"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/live-hack-cve/cve-2014-8312"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.onapsis.com."
      },
      {
        "trust": 0.1,
        "url": "https://service.sap.com/sap/support/notes/1967780."
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2014-8312"
      },
      {
        "db": "BID",
        "id": "70292"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004933"
      },
      {
        "db": "PACKETSTORM",
        "id": "128603"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-8312"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201410-581"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2014-8312"
      },
      {
        "db": "BID",
        "id": "70292"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004933"
      },
      {
        "db": "PACKETSTORM",
        "id": "128603"
      },
      {
        "db": "NVD",
        "id": "CVE-2014-8312"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201410-581"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-10-16T00:00:00",
        "db": "VULMON",
        "id": "CVE-2014-8312"
      },
      {
        "date": "2014-10-08T00:00:00",
        "db": "BID",
        "id": "70292"
      },
      {
        "date": "2014-10-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-004933"
      },
      {
        "date": "2014-10-08T22:22:44",
        "db": "PACKETSTORM",
        "id": "128603"
      },
      {
        "date": "2014-10-16T19:55:19.990000",
        "db": "NVD",
        "id": "CVE-2014-8312"
      },
      {
        "date": "2014-10-22T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201410-581"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-10-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2014-8312"
      },
      {
        "date": "2015-04-13T21:01:00",
        "db": "BID",
        "id": "70292"
      },
      {
        "date": "2014-10-23T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-004933"
      },
      {
        "date": "2022-10-06T15:20:09.903000",
        "db": "NVD",
        "id": "CVE-2014-8312"
      },
      {
        "date": "2022-10-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201410-581"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201410-581"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SAP Netweaver AS ABAP of  Business Warehouse Vulnerability in which important information is obtained",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-004933"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201410-581"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.