cvelist/2016/7xxx/CVE-2016-7435.json
2019-03-18 00:13:04 +00:00

97 lines
3.9 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2016-7435",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The (1) SCTC_REFRESH_EXPORT_TAB_COMP, (2) SCTC_REFRESH_CHECK_ENV, and (3) SCTC_TMS_MAINTAIN_ALOG functions in the SCTC subpackage in SAP Netweaver 7.40 SP 12 allow remote authenticated users with certain permissions to execute arbitrary commands via vectors involving a CALL 'SYSTEM' statement, aka SAP Security Note 2260344."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20161003 Onapsis Security Advisory ONAPSIS-2016-043: SAP OS Command Injection in SCTC_TMS_MAINTAIN_ALOG",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Oct/1"
},
{
"name": "20161003 Onapsis Security Advisory ONAPSIS-2016-041: SAP OS Command Injection in SCTC_REFRESH_EXPORT_TAB_COMP",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Oct/0"
},
{
"name": "https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctcrefreshcheckenv",
"refsource": "MISC",
"url": "https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctcrefreshcheckenv"
},
{
"name": "https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctcrefreshexporttabcomp",
"refsource": "MISC",
"url": "https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctcrefreshexporttabcomp"
},
{
"name": "https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctctmsmaintainalog",
"refsource": "MISC",
"url": "https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctctmsmaintainalog"
},
{
"name": "93272",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/93272"
},
{
"name": "20161003 Onapsis Security Advisory ONAPSIS-2016-042: SAP OS Command Injection in SCTC_REFRESH_CHECK_ENV",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2016/Oct/2"
},
{
"name": "https://www.onapsis.com/blog/analyzing-sap-security-notes-march-2016",
"refsource": "MISC",
"url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-march-2016"
}
]
}
}