cvelist/2019/0xxx/CVE-2019-0283.json

84 lines
3.3 KiB
JSON
Raw Normal View History

2018-11-26 08:03:09 -05:00
{
2019-04-10 21:00:46 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
2019-03-17 21:37:05 +00:00
"CVE_data_meta": {
"ID": "CVE-2019-0283",
2019-04-10 21:00:46 +00:00
"ASSIGNER": "cna@sap.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP NetWeaver Process Integration (Adapter Engine)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "from 7.10 to 7.11"
},
{
"version_name": "<",
"version_value": "7.30"
},
{
"version_name": "<",
"version_value": "7.31"
},
{
"version_name": "<",
"version_value": "7.40"
},
{
"version_name": "<",
"version_value": "7.50"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Digital Signature Spoofing"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114",
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114"
},
{
"refsource": "CONFIRM",
"name": "https://launchpad.support.sap.com/#/notes/2747683",
"url": "https://launchpad.support.sap.com/#/notes/2747683"
}
]
2019-03-17 21:37:05 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2019-04-10 21:00:46 +00:00
"value": "SAP NetWeaver Process Integration (Adapter Engine), fixed in versions 7.10 to 7.11, 7.30, 7.31, 7.40, 7.50; is vulnerable to Digital Signature Spoofing. It is possible to spoof XML signatures and send arbitrary requests to the server via PI Axis adapter. These requests will be accepted by the PI Axis adapter even if the payload has been altered, especially when the signed element is the body of the xml document."
2019-03-17 21:37:05 +00:00
}
]
}
}