{ "id": "CVE-2018-2401", "sourceIdentifier": "cna@sap.com", "published": "2018-03-14T19:29:00.470", "lastModified": "2019-10-09T23:40:02.997", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "SAP Business Process Automation (BPA) By Redwood does not sufficiently validate an XML document accepted from an untrusted source resulting in an XML External Entity (XXE) vulnerability." }, { "lang": "es", "value": "SAP Business Process Automation (BPA) de Redwood no valida lo suficiente un documento XML aceptado de una fuente no fiable, lo que resulta en una vulnerabilidad de XEE (XML External Entity)." } ], "metrics": { "cvssMetricV30": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 }, { "source": "cna@sap.com", "type": "Secondary", "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "LOW", "baseScore": 5.4, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, "impactScore": 2.5 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 6.5 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-611" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:redwood:sap_business_process_automation:9.00:*:*:*:*:*:*:*", "matchCriteriaId": "71A17CD7-898C-4CD5-8FAF-F0C8027FFDD2" } ] } ] } ], "references": [ { "url": "http://www.securityfocus.com/bid/103374", "source": "cna@sap.com", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "https://blogs.sap.com/2018/03/13/sap-security-patch-day-march-2018/", "source": "cna@sap.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://launchpad.support.sap.com/#/notes/2596766", "source": "cna@sap.com", "tags": [ "Permissions Required" ] } ] }