mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
193 lines
8.9 KiB
JSON
193 lines
8.9 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-0014",
|
|
"ASSIGNER": "cna@sap.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "SAP NetWeaver ABAP Server and ABAP Platform - versions SAP_BASIS 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, KERNEL 7.22, 7.53, 7.77, 7.81, 7.85, 7.89, KRNL64UC 7.22, 7.22EXT, 7.53, KRNL64NUC 7.22, 7.22EXT, creates information about system identity in an ambiguous format. This could lead to capture-replay vulnerability and may be exploited by malicious users to obtain illegitimate access to the system."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-294 Authentication Bypass by Capture-replay",
|
|
"cweId": "CWE-294"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "SAP",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "NetWeaver ABAP Server and ABAP Platform",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "SAP_BASIS 701",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 702",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 710",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 711",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 730",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 731",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 740",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 750",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 751",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 752",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 753",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 754",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 755",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 756",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "SAP_BASIS 757",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "KERNEL 7.22",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "KERNEL 7.53",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "KERNEL 7.77",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "KERNEL 7.81",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "KERNEL 7.85",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "KERNEL 7.89",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "KRNL64UC 7.22",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "KRNL64UC 7.22EXT",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "KRNL64UC 7.53",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "KRNL64NUC 7.22",
|
|
"version_affected": "="
|
|
},
|
|
{
|
|
"version_value": "KRNL64NUC 7.22EXT",
|
|
"version_affected": "="
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
|
|
},
|
|
{
|
|
"url": "https://launchpad.support.sap.com/#/notes/3089413",
|
|
"refsource": "MISC",
|
|
"name": "https://launchpad.support.sap.com/#/notes/3089413"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.1.0-dev"
|
|
},
|
|
"source": {
|
|
"discovery": "UNKNOWN"
|
|
},
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9,
|
|
"baseSeverity": "CRITICAL",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
]
|
|
}
|
|
} |