2023-10-10 14:00:28 +00:00

63 lines
2.2 KiB
JSON

{
"id": "CVE-2023-41365",
"sourceIdentifier": "cna@sap.com",
"published": "2023-10-10T02:15:10.777",
"lastModified": "2023-10-10T12:16:32.703",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",
"value": "SAP Business One (B1i) - version 10.0, allows an authorized attacker to retrieve the details stack trace of the fault message to conduct the XXE injection, which will lead to information disclosure. After successful exploitation, an attacker can cause limited impact on the confidentiality and no impact to the integrity and availability.\n\n"
},
{
"lang": "es",
"value": "SAP Business One (B1i): versi\u00f3n 10.0, permite a un atacante autorizado recuperar el seguimiento de la pila de detalles del mensaje de error para realizar la inyecci\u00f3n XXE, lo que conducir\u00e1 a la divulgaci\u00f3n de informaci\u00f3n. Despu\u00e9s de una explotaci\u00f3n exitosa, un atacante puede causar un impacto limitado en la confidencialidad y ning\u00fan impacto en la integridad y disponibilidad."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3338380",
"source": "cna@sap.com"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
"source": "cna@sap.com"
}
]
}