mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
145 lines
6.1 KiB
JSON
145 lines
6.1 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-27269",
|
|
"ASSIGNER": "cna@sap.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "SAP NetWeaver Application Server for ABAP and ABAP Platform - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791, allows an attacker with non-administrative authorizations to exploit a directory traversal flaw in an available service to overwrite the system files. \u00a0In this attack, no data can be read but potentially critical OS files can be overwritten making the system unavailable.\n\n"
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
|
|
"cweId": "CWE-22"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "SAP",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "NetWeaver Application Server for ABAP and ABAP Platform",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "700"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "701"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "702"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "731"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "740"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "750"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "751"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "752"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "753"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "754"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "755"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "756"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "757"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "791"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://launchpad.support.sap.com/#/notes/3294595",
|
|
"refsource": "MISC",
|
|
"name": "https://launchpad.support.sap.com/#/notes/3294595"
|
|
},
|
|
{
|
|
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.6,
|
|
"baseSeverity": "CRITICAL",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |