cvelist/2024/39xxx/CVE-2024-39598.json
2024-07-09 05:00:38 +00:00

145 lines
5.8 KiB
JSON

{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-39598",
"ASSIGNER": "cna@sap.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "SAP CRM (WebClient UI Framework) allows an\nauthenticated attacker to enumerate accessible HTTP endpoints in the internal\nnetwork by specially crafting HTTP requests. On successful exploitation this\ncan result in information disclosure. It has no impact on integrity and\navailability of the application."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-918: Server-Side Request Forgery",
"cweId": "CWE-918"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "SAP_SE",
"product": {
"product_data": [
{
"product_name": "SAP CRM WebClient UI",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "S4FND 102"
},
{
"version_affected": "=",
"version_value": "S4FND 103"
},
{
"version_affected": "=",
"version_value": "S4FND 104"
},
{
"version_affected": "=",
"version_value": "S4FND 105"
},
{
"version_affected": "=",
"version_value": "S4FND 106"
},
{
"version_affected": "=",
"version_value": "S4FND 107"
},
{
"version_affected": "=",
"version_value": "S4FND 108"
},
{
"version_affected": "=",
"version_value": "WEBCUIF 701"
},
{
"version_affected": "=",
"version_value": "WEBCUIF 731"
},
{
"version_affected": "=",
"version_value": "WEBCUIF 746"
},
{
"version_affected": "=",
"version_value": "WEBCUIF 747"
},
{
"version_affected": "=",
"version_value": "WEBCUIF 748"
},
{
"version_affected": "=",
"version_value": "WEBCUIF 800"
},
{
"version_affected": "=",
"version_value": "WEBCUIF 801"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://url.sap/sapsecuritypatchday",
"refsource": "MISC",
"name": "https://url.sap/sapsecuritypatchday"
},
{
"url": "https://me.sap.com/notes/3467377",
"refsource": "MISC",
"name": "https://me.sap.com/notes/3467377"
}
]
},
"generator": {
"engine": "Vulnogram 0.2.0"
},
"source": {
"discovery": "UNKNOWN"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
}
]
}
}