mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
98 lines
3.6 KiB
JSON
98 lines
3.6 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2016-7435",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "The (1) SCTC_REFRESH_EXPORT_TAB_COMP, (2) SCTC_REFRESH_CHECK_ENV, and (3) SCTC_TMS_MAINTAIN_ALOG functions in the SCTC subpackage in SAP Netweaver 7.40 SP 12 allow remote authenticated users with certain permissions to execute arbitrary commands via vectors involving a CALL 'SYSTEM' statement, aka SAP Security Note 2260344."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20161003 Onapsis Security Advisory ONAPSIS-2016-041: SAP OS Command Injection in SCTC_REFRESH_EXPORT_TAB_COMP",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://seclists.org/fulldisclosure/2016/Oct/0"
|
|
},
|
|
{
|
|
"name" : "20161003 Onapsis Security Advisory ONAPSIS-2016-042: SAP OS Command Injection in SCTC_REFRESH_CHECK_ENV",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://seclists.org/fulldisclosure/2016/Oct/2"
|
|
},
|
|
{
|
|
"name" : "20161003 Onapsis Security Advisory ONAPSIS-2016-043: SAP OS Command Injection in SCTC_TMS_MAINTAIN_ALOG",
|
|
"refsource" : "FULLDISC",
|
|
"url" : "http://seclists.org/fulldisclosure/2016/Oct/1"
|
|
},
|
|
{
|
|
"name" : "https://www.onapsis.com/blog/analyzing-sap-security-notes-march-2016",
|
|
"refsource" : "MISC",
|
|
"url" : "https://www.onapsis.com/blog/analyzing-sap-security-notes-march-2016"
|
|
},
|
|
{
|
|
"name" : "https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctcrefreshcheckenv",
|
|
"refsource" : "MISC",
|
|
"url" : "https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctcrefreshcheckenv"
|
|
},
|
|
{
|
|
"name" : "https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctcrefreshexporttabcomp",
|
|
"refsource" : "MISC",
|
|
"url" : "https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctcrefreshexporttabcomp"
|
|
},
|
|
{
|
|
"name" : "https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctctmsmaintainalog",
|
|
"refsource" : "MISC",
|
|
"url" : "https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctctmsmaintainalog"
|
|
},
|
|
{
|
|
"name" : "93272",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/93272"
|
|
}
|
|
]
|
|
}
|
|
}
|