cvelist/2020/6xxx/CVE-2020-6320.json

83 lines
2.9 KiB
JSON
Raw Normal View History

2020-01-08 14:01:26 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-6320",
2020-09-09 13:01:36 +00:00
"ASSIGNER": "cna@sap.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP SE",
"product": {
"product_data": [
{
"product_name": "SAP Marketing (Mobile Channel Servlet)",
"version": {
"version_data": [
{
"version_name": "<",
"version_value": "130"
},
{
"version_name": "<",
"version_value": "140"
},
{
"version_name": "<",
"version_value": "150"
}
]
}
}
]
}
}
]
}
2020-01-08 14:01:26 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-09-09 13:01:36 +00:00
"value": "SAP Marketing (Servlet), version-130,140,150, allows an authenticated attacker to invoke certain functions that are restricted. Limited knowledge of payload is required for an attacker to exploit the vulnerability and perform tasks related to contact and interaction data which impacts Confidentiality and Integrity of data in the application."
}
]
},
"impact": {
"cvss": {
"baseScore": "9.6",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Access Control"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700",
"refsource": "MISC",
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700"
},
{
"url": "https://launchpad.support.sap.com/#/notes/2961991",
"refsource": "MISC",
"name": "https://launchpad.support.sap.com/#/notes/2961991"
2020-01-08 14:01:26 +00:00
}
]
}
}