mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
79 lines
2.7 KiB
JSON
79 lines
2.7 KiB
JSON
{
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"data_version": "4.0",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2020-6278",
|
|
"ASSIGNER": "cna@sap.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "SAP SE",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "SAP Business Objects Business Intelligence Platform (BI Launchpad and CMC)",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_name": "<",
|
|
"version_value": "4.1"
|
|
},
|
|
{
|
|
"version_name": "<",
|
|
"version_value": "4.2"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "SAP Business Objects Business Intelligence Platform (BI Launchpad and CMC), versions 4.1, 4.2, allows to an attacker to embed malicious scripts in the application while uploading images, which gets executed when the victim opens these files, leading to Stored Cross Site Scripting"
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"baseScore": "5.4",
|
|
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
|
"version": "3.0"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Cross Site Scripting"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675",
|
|
"refsource": "MISC",
|
|
"name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675"
|
|
},
|
|
{
|
|
"url": "https://launchpad.support.sap.com/#/notes/2912708",
|
|
"refsource": "MISC",
|
|
"name": "https://launchpad.support.sap.com/#/notes/2912708"
|
|
}
|
|
]
|
|
}
|
|
} |