mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
145 lines
6.0 KiB
JSON
145 lines
6.0 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-25618",
|
|
"ASSIGNER": "cna@sap.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "SAP NetWeaver Application Server for ABAP and ABAP Platform - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791, has multiple vulnerabilities in an unused class for error handling in which an attacker authenticated as a non-administrative user can craft a request with certain parameters which will consume the server's resources sufficiently to make it unavailable. There is no ability to view or modify any information.\n\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-400: Uncontrolled Resource Consumption",
|
|
"cweId": "CWE-400"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "SAP",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "NetWeaver AS for ABAP and ABAP Platform",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "700"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "701"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "702"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "731"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "740"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "750"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "751"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "752"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "753"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "754"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "755"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "756"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "757"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "791"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://launchpad.support.sap.com/#/notes/3296346",
|
|
"refsource": "MISC",
|
|
"name": "https://launchpad.support.sap.com/#/notes/3296346"
|
|
},
|
|
{
|
|
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |