2023-09-12 16:00:29 +00:00
{
"id" : "CVE-2023-37489" ,
2023-09-14 04:00:29 +00:00
"sourceIdentifier" : "cna@sap.com" ,
2023-09-12 16:00:29 +00:00
"published" : "2023-09-12T02:15:12.160" ,
2023-09-14 04:00:29 +00:00
"lastModified" : "2023-09-14T02:07:38.067" ,
"vulnStatus" : "Analyzed" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-09-12 16:00:29 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Due to the lack of validation, SAP BusinessObjects Business Intelligence Platform (Version Management System) - version 403, permits an unauthenticated user to read the code snippet through the UI, which leads to low impact on confidentiality and no impact on the application's availability or integrity.\n\n"
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "Debido a la falta de validaci\u00f3n, SAP BusinessObjects Business Intelligence Platform (Version Management System) - versi\u00f3n 403, permite que un usuario no autenticado lea el fragmento de c\u00f3digo a trav\u00e9s de la interfaz de usuario, lo que conduce a un bajo impacto en la confidencialidad y ning\u00fan impacto en la disponibilidad o integridad de la aplicaci\u00f3n."
2023-09-12 16:00:29 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2023-09-14 04:00:29 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
} ,
{
"source" : "cna@sap.com" ,
2023-09-12 16:00:29 +00:00
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "LOW" ,
"integrityImpact" : "NONE" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
}
]
} ,
"weaknesses" : [
{
2023-09-14 04:00:29 +00:00
"source" : "cna@sap.com" ,
2023-09-12 16:00:29 +00:00
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-209"
}
]
}
] ,
2023-09-14 04:00:29 +00:00
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:sap:businessobjects_business_intelligence:430:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "85CBCF48-5478-4EE5-8F69-6E59EFDB707D"
}
]
}
]
}
] ,
2023-09-12 16:00:29 +00:00
"references" : [
{
"url" : "https://me.sap.com/notes/3352453" ,
2023-09-14 04:00:29 +00:00
"source" : "cna@sap.com" ,
"tags" : [
"Permissions Required"
]
2023-09-12 16:00:29 +00:00
} ,
{
"url" : "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" ,
2023-09-14 04:00:29 +00:00
"source" : "cna@sap.com" ,
"tags" : [
"Vendor Advisory"
]
2023-09-12 16:00:29 +00:00
}
]
}