mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
79 lines
2.6 KiB
JSON
79 lines
2.6 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2021-40497",
|
|
"ASSIGNER": "cna@sap.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "SAP SE",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "SAP BusinessObjects Analysis, (edition for OLAP)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_name": "<",
|
|
"version_value": "420"
|
|
},
|
|
{
|
|
"version_name": "<",
|
|
"version_value": "430"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "SAP BusinessObjects Analysis (edition for OLAP) - versions 420, 430, allows an attacker to exploit certain application endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation could lead to exposure of some system specific data like its version."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"baseScore": "null",
|
|
"vectorString": "null",
|
|
"version": "3.0"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Information Disclosure"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983",
|
|
"refsource": "MISC",
|
|
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983"
|
|
},
|
|
{
|
|
"url": "https://launchpad.support.sap.com/#/notes/3098917",
|
|
"refsource": "MISC",
|
|
"name": "https://launchpad.support.sap.com/#/notes/3098917"
|
|
}
|
|
]
|
|
}
|
|
} |