var-201904-1086
Vulnerability from variot
SAP NetWeaver Process Integration (Adapter Engine), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; is vulnerable to Digital Signature Spoofing. It is possible to spoof XML signatures and send arbitrary requests to the server via PI Axis adapter. These requests will be accepted by the PI Axis adapter even if the payload has been altered, especially when the signed element is the body of the xml document. An attacker can exploit this issue to conduct spoofing attacks, disclose sensitive information and perform unauthorized actions. This may aid in further attacks
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201904-1086", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "netweaver process integration", "scope": "eq", "trust": 1.8, "vendor": "sap", "version": "7.30" }, { "model": "netweaver process integration", "scope": "eq", "trust": 1.8, "vendor": "sap", "version": "7.31" }, { "model": "netweaver process integration", "scope": "eq", "trust": 1.8, "vendor": "sap", "version": "7.40" }, { "model": "netweaver process integration", "scope": "eq", "trust": 1.8, "vendor": "sap", "version": "7.50" }, { "model": "netweaver process integration", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "7.10" }, { "model": "netweaver process integration", "scope": "eq", "trust": 1.0, "vendor": "sap", "version": "7.11" }, { "model": "netweaver process integration", "scope": "eq", "trust": 0.8, "vendor": "sap", "version": "7.10 to 7.11" }, { "model": "netweaver process integration", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "750" }, { "model": "netweaver process integration", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "740" }, { "model": "netweaver process integration", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "731" }, { "model": "netweaver process integration", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "730" }, { "model": "netweaver process integration", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "711" }, { "model": "netweaver process integration", "scope": "eq", "trust": 0.3, "vendor": "sap", "version": "710" } ], "sources": [ { "db": "BID", "id": "107808" }, { "db": "JVNDB", "id": "JVNDB-2019-003333" }, { "db": "NVD", "id": "CVE-2019-0283" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sap:netweaver_process_integration:7.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_process_integration:7.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_process_integration:7.30:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_process_integration:7.40:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_process_integration:7.31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sap:netweaver_process_integration:7.50:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2019-0283" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "107808" } ], "trust": 0.3 }, "cve": "CVE-2019-0283", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.0, "impactScore": 4.9, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2019-0283", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "exploitabilityScore": 2.8, "impactScore": 4.2, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 7.1, "baseSeverity": "High", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "CVE-2019-0283", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2019-0283", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201904-421", "trust": 0.6, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2019-0283", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-0283" }, { "db": "JVNDB", "id": "JVNDB-2019-003333" }, { "db": "NVD", "id": "CVE-2019-0283" }, { "db": "CNNVD", "id": "CNNVD-201904-421" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP NetWeaver Process Integration (Adapter Engine), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; is vulnerable to Digital Signature Spoofing. It is possible to spoof XML signatures and send arbitrary requests to the server via PI Axis adapter. These requests will be accepted by the PI Axis adapter even if the payload has been altered, especially when the signed element is the body of the xml document. \nAn attacker can exploit this issue to conduct spoofing attacks, disclose sensitive information and perform unauthorized actions. This may aid in further attacks", "sources": [ { "db": "NVD", "id": "CVE-2019-0283" }, { "db": "JVNDB", "id": "JVNDB-2019-003333" }, { "db": "BID", "id": "107808" }, { "db": "VULMON", "id": "CVE-2019-0283" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2019-0283", "trust": 2.8 }, { "db": "BID", "id": "107808", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2019-003333", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201904-421", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2019-0283", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-0283" }, { "db": "BID", "id": "107808" }, { "db": "JVNDB", "id": "JVNDB-2019-003333" }, { "db": "NVD", "id": "CVE-2019-0283" }, { "db": "CNNVD", "id": "CNNVD-201904-421" } ] }, "id": "VAR-201904-1086", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.15555556 }, "last_update_date": "2023-12-18T13:28:33.516000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "SAP Security Patch Day - April 2019", "trust": 0.8, "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageid=517899114" }, { "title": "SAP NetWeaver Process Integration Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=91250" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003333" }, { "db": "CNNVD", "id": "CNNVD-201904-421" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-290", "trust": 1.0 }, { "problemtype": "CWE-284", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003333" }, { "db": "NVD", "id": "CVE-2019-0283" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageid=517899114" }, { "trust": 2.0, "url": "https://launchpad.support.sap.com/#/notes/2747683" }, { "trust": 1.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0283" }, { "trust": 1.3, "url": "http://www.securityfocus.com/bid/107808" }, { "trust": 0.9, "url": "http://www.sap.com/" }, { "trust": 0.9, "url": "https://help.sap.com/nw_platform" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0283" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/sap-multiples-vulnerabilities-of-april-2019-28982" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/290.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2019-0283" }, { "db": "BID", "id": "107808" }, { "db": "JVNDB", "id": "JVNDB-2019-003333" }, { "db": "NVD", "id": "CVE-2019-0283" }, { "db": "CNNVD", "id": "CNNVD-201904-421" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2019-0283" }, { "db": "BID", "id": "107808" }, { "db": "JVNDB", "id": "JVNDB-2019-003333" }, { "db": "NVD", "id": "CVE-2019-0283" }, { "db": "CNNVD", "id": "CNNVD-201904-421" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-04-10T00:00:00", "db": "VULMON", "id": "CVE-2019-0283" }, { "date": "2019-04-09T00:00:00", "db": "BID", "id": "107808" }, { "date": "2019-05-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003333" }, { "date": "2019-04-10T21:29:01.277000", "db": "NVD", "id": "CVE-2019-0283" }, { "date": "2019-04-09T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-421" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-08-24T00:00:00", "db": "VULMON", "id": "CVE-2019-0283" }, { "date": "2019-04-09T00:00:00", "db": "BID", "id": "107808" }, { "date": "2019-05-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2019-003333" }, { "date": "2020-08-24T17:37:01.140000", "db": "NVD", "id": "CVE-2019-0283" }, { "date": "2020-08-25T00:00:00", "db": "CNNVD", "id": "CNNVD-201904-421" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-421" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "SAP NetWeaver Process Integration Access control vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2019-003333" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201904-421" } ], "trust": 0.6 } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.