cvelist/2023/0xxx/CVE-2023-0016.json

97 lines
3.3 KiB
JSON
Raw Normal View History

2022-12-16 04:00:43 +00:00
{
2023-01-10 04:00:42 +00:00
"data_version": "4.0",
2022-12-16 04:00:43 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-0016",
2023-01-10 04:00:42 +00:00
"ASSIGNER": "cna@sap.com",
"STATE": "PUBLIC"
2022-12-16 04:00:43 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-01-10 04:00:42 +00:00
"value": "SAP BPC MS 10.0 - version 810, allows an unauthorized attacker to execute crafted database queries. The exploitation of this issue could lead to SQL injection vulnerability and could allow an attacker to access, modify, and/or delete data from the backend database."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')",
"cweId": "CWE-89"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP",
"product": {
"product_data": [
{
"product_name": "SAP BPC MS 10.0",
"version": {
"version_data": [
{
"version_value": "800",
"version_affected": "="
},
{
"version_value": "810",
"version_affected": "="
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"refsource": "MISC",
"name": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
},
{
"url": "https://launchpad.support.sap.com/#/notes/3275391",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/3275391"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
2022-12-16 04:00:43 +00:00
}
]
}
}