mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
149 lines
5.9 KiB
JSON
149 lines
5.9 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2024-44117",
|
|
"ASSIGNER": "cna@sap.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The RFC enabled function module allows a low privileged user to perform various actions, such as modifying the URLs of any user's favourite nodes and workbook ID. There is low impact on integrity and availability of the application."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-862: Missing Authorization",
|
|
"cweId": "CWE-862"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "SAP_SE",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "SAP NetWeaver Application Server for ABAP and ABAP Platform",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "700"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "701"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "702"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "731"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "740"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "750"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "751"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "752"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "753"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "754"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "755"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "756"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "757"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "758"
|
|
},
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "912"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://me.sap.com/notes/3488039",
|
|
"refsource": "MISC",
|
|
"name": "https://me.sap.com/notes/3488039"
|
|
},
|
|
{
|
|
"url": "https://url.sap/sapsecuritypatchday",
|
|
"refsource": "MISC",
|
|
"name": "https://url.sap/sapsecuritypatchday"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.2.0"
|
|
},
|
|
"source": {
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 5.4,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |