- Added submission from SAP from 2019-01-08.

This commit is contained in:
CVE Team 2019-01-08 14:39:57 -05:00
parent 0ac8ca26e3
commit 8e1501d3d6
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
12 changed files with 796 additions and 48 deletions

View File

@ -1,8 +1,124 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-2484",
"STATE" : "RESERVED"
"ASSIGNER" : "cna@sap.com",
"ID" : "CVE-2018-2484"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP Enterprise Financial Services (SAPSCORE)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "1.13"
},
{
"version_name" : "<",
"version_value" : "1.14"
},
{
"version_name" : "<",
"version_value" : "1.15"
}
]
}
},
{
"product_name" : "SAP Enterprise Financial Services (S4CORE)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "1.01"
},
{
"version_name" : "<",
"version_value" : "1.02"
},
{
"version_name" : "<",
"version_value" : "1.03"
}
]
}
},
{
"product_name" : "SAP Enterprise Financial Services (EA-FINSERV)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "1.10"
},
{
"version_name" : "<",
"version_value" : "2.0"
},
{
"version_name" : "<",
"version_value" : "5.0"
},
{
"version_name" : "<",
"version_value" : "6.0"
},
{
"version_name" : "<",
"version_value" : "6.03"
},
{
"version_name" : "<",
"version_value" : "6.04"
},
{
"version_name" : "<",
"version_value" : "6.05"
},
{
"version_name" : "<",
"version_value" : "6.06"
},
{
"version_name" : "<",
"version_value" : "6.16"
},
{
"version_name" : "<",
"version_value" : "6.17"
},
{
"version_name" : "<",
"version_value" : "6.18"
},
{
"version_name" : "<",
"version_value" : "8.0"
}
]
}
},
{
"product_name" : "SAP Enterprise Financial Services (Bank/CFM)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "4.63_20"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +127,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "SAP Enterprise Financial Services (fixed in SAPSCORE 1.13, 1.14, 1.15; S4CORE 1.01, 1.02, 1.03; EA-FINSERV 1.10, 2.0, 5.0, 6.0, 6.03, 6.04, 6.05, 6.06, 6.16, 6.17, 6.18, 8.0; Bank/CFM 4.63_20) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Missing Authorization Check"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/2662687"
},
{
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
}
]
}

View File

@ -1,8 +1,35 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-2499",
"STATE" : "RESERVED"
"ASSIGNER" : "cna@sap.com",
"ID" : "CVE-2018-2499"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP Financial Consolidation Cube Designer (BOBJ_EADES)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "8.0"
},
{
"version_name" : "<",
"version_value" : "10.1"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +38,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "A security weakness in SAP Financial Consolidation Cube Designer (BOBJ_EADES fixed in versions 8.0, 10.1) may allow an attacker to discover the password hash of an admin user."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information Disclosure"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/2699233"
},
{
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
}
]
}

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-0238",
"STATE" : "RESERVED"
"ASSIGNER" : "cna@sap.com",
"ID" : "CVE-2019-0238"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP Commerce (ex. SAP Hybris Commerce)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "6.7"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +34,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "SAP Commerce (previously known as SAP Hybris Commerce), before version 6.7, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Cross-Site Scripting"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/2697573"
},
{
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
}
]
}

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-0240",
"STATE" : "RESERVED"
"ASSIGNER" : "cna@sap.com",
"ID" : "CVE-2019-0240"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP Business Objects Mobile for Android",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "6.3.5"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +34,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "SAP Business Objects Mobile for Android (before 6.3.5) application allows an attacker to provide malicious input in the form of a SAP BI link, preventing legitimate users from accessing the application by crashing it."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Denial of Service"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/2724059"
},
{
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
}
]
}

View File

@ -1,8 +1,35 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-0241",
"STATE" : "RESERVED"
"ASSIGNER" : "cna@sap.com",
"ID" : "CVE-2019-0241"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP Work and Inventory Manager (Agentry_SDK)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "7.0"
},
{
"version_name" : "<",
"version_value" : "7.1"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +38,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "SAP Work and Inventory Manager (Agentry_SDK , before 7.0, 7.1) allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Denial of Service"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/2725538"
},
{
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
}
]
}

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-0243",
"STATE" : "RESERVED"
"ASSIGNER" : "cna@sap.com",
"ID" : "CVE-2019-0243"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP BW/4HANA (DW4CORE)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "1.0 (SP08)"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +34,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "Under some circumstances, masterdata maintenance in SAP BW/4HANA (fixed in DW4CORE version 1.0 (SP08)) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Missing Authorization Check"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/2727623"
},
{
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
}
]
}

View File

@ -1,8 +1,73 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-0244",
"STATE" : "RESERVED"
"ASSIGNER" : "cna@sap.com",
"ID" : "CVE-2019-0244"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP CRM WebClient UI (SAPSCORE)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "1.12"
}
]
}
},
{
"product_name" : "SAP CRM WebClient UI (S4FND)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "1.02"
}
]
}
},
{
"product_name" : "SAP CRM WebClient UI (WEBCUIF)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "7.31"
},
{
"version_name" : "<",
"version_value" : "7.46"
},
{
"version_name" : "<",
"version_value" : "7.47"
},
{
"version_name" : "<",
"version_value" : "7.48"
},
{
"version_name" : "<",
"version_value" : "8.0"
},
{
"version_name" : "<",
"version_value" : "8.01"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +76,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "SAP CRM WebClient UI (fixed in SAPSCORE 1.12; S4FND 1.02; WEBCUIF 7.31, 7.46, 7.47, 7.48, 8.0, 8.01) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Cross-Site Scripting"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/2588763"
},
{
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
}
]
}

View File

@ -1,8 +1,73 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-0245",
"STATE" : "RESERVED"
"ASSIGNER" : "cna@sap.com",
"ID" : "CVE-2019-0245"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP CRM WebClient UI (SAPSCORE)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "1.12"
}
]
}
},
{
"product_name" : "SAP CRM WebClient UI (S4FND)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "1.02"
}
]
}
},
{
"product_name" : "SAP CRM WebClient UI (WEBCUIF)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "7.31"
},
{
"version_name" : "<",
"version_value" : "7.46"
},
{
"version_name" : "<",
"version_value" : "7.47"
},
{
"version_name" : "<",
"version_value" : "7.48"
},
{
"version_name" : "<",
"version_value" : "8.0"
},
{
"version_name" : "<",
"version_value" : "8.01"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +76,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "SAP CRM WebClient UI (fixed in SAPSCORE 1.12; S4FND 1.02; WEBCUIF 7.31, 7.46, 7.47, 7.48, 8.0, 8.01) does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Cross-Site Scripting"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/2588763"
},
{
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
}
]
}

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-0246",
"STATE" : "RESERVED"
"ASSIGNER" : "cna@sap.com",
"ID" : "CVE-2019-0246"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP Cloud Connector",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "2.11.3"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +34,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "SAP Cloud Connector, before version 2.11.3, does not perform any authentication checks for functionalities that require user identity."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Missing Authentication"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/2696233"
},
{
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
}
]
}

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-0247",
"STATE" : "RESERVED"
"ASSIGNER" : "cna@sap.com",
"ID" : "CVE-2019-0247"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP Cloud Connector",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "2.11.3"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +34,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "SAP Cloud Connector, before version 2.11.3, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Code Injection"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/2696233"
},
{
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
}
]
}

View File

@ -1,8 +1,54 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-0248",
"STATE" : "RESERVED"
"ASSIGNER" : "cna@sap.com",
"ID" : "CVE-2019-0248"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP Gateway of ABAP Application Server(SAP_GWFND)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "7.5"
},
{
"version_name" : "<",
"version_value" : "7.51"
},
{
"version_name" : "<",
"version_value" : "7.52"
},
{
"version_name" : "<",
"version_value" : "7.53"
}
]
}
},
{
"product_name" : "SAP Gateway of ABAP Application Server(SAP_BASIS)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "7.5"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +57,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "Under certain conditions SAP Gateway of ABAP Application Server (fixed in SAP_GWFND 7.5, 7.51, 7.52, 7.53; SAP_BASIS 7.5) allows an attacker to access information which would otherwise be restricted."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information Disclosure"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/2723142"
},
{
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
}
]
}

View File

@ -1,8 +1,31 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2019-0249",
"STATE" : "RESERVED"
"ASSIGNER" : "cna@sap.com",
"ID" : "CVE-2019-0249"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "SAP Landscape Management(VCM)",
"version" : {
"version_data" : [
{
"version_name" : "<",
"version_value" : "3.0"
}
]
}
}
]
},
"vendor_name" : "SAP SE"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +34,29 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "Under certain conditions SAP Landscape Management (VCM 3.0) allows an attacker to access information which would otherwise be restricted."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information Disclosure"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://launchpad.support.sap.com/#/notes/2727624"
},
{
"url" : "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=509151985"
}
]
}