cvelist/2020/6xxx/CVE-2020-6254.json

79 lines
2.6 KiB
JSON
Raw Normal View History

2020-01-08 14:01:06 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-6254",
2020-05-12 18:01:27 +00:00
"ASSIGNER": "cna@sap.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP Enterprise Threat Detection",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "1.0"
},
{
"version_name": "<",
"version_value": "2.0"
}
]
}
}
]
}
}
]
}
2020-01-08 14:01:06 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-05-12 18:01:27 +00:00
"value": "SAP Enterprise Threat Detection, versions 1.0, 2.0, does not sufficiently encode error response pages in case of errors, allowing XSS payload reflecting in the response, leading to reflected Cross Site Scripting."
}
]
},
"impact": {
"cvss": {
"baseScore": "6.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Cross Site Scripting"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=545396222",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=545396222"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2913293",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2913293"
2020-01-08 14:01:06 +00:00
}
]
}
}