mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
187 lines
6.1 KiB
JSON
187 lines
6.1 KiB
JSON
{
|
|
"id": "CVE-2024-34689",
|
|
"sourceIdentifier": "cna@sap.com",
|
|
"published": "2024-07-09T05:15:10.873",
|
|
"lastModified": "2024-09-09T15:31:15.670",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "WebFlow Services of SAP Business Workflow allows\nan authenticated attacker to enumerate accessible HTTP endpoints in the\ninternal network by specially crafting HTTP requests. On successful\nexploitation this can result in information disclosure. It has no impact on\nintegrity and availability of the application."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "WebFlow Services de SAP Business Workflow permite a un atacante autenticado enumerar endpoints HTTP accesibles en la red interna mediante la elaboraci\u00f3n especial de solicitudes HTTP. Si se explota con \u00e9xito, esto puede dar lugar a la divulgaci\u00f3n de informaci\u00f3n. No tiene ning\u00fan impacto en la integridad y disponibilidad de la aplicaci\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 3.1,
|
|
"impactScore": 1.4
|
|
},
|
|
{
|
|
"source": "cna@sap.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.0,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 3.1,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-918"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "cna@sap.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-918"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:business_workflow:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1FF29F57-F1C8-4905-B61F-9E72BF689C39"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:700:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "85616273-040E-49CB-8EB6-D2D4D7B603E5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:701:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "C5F2C3A9-DCC0-4FF1-8E68-9EA150E209F6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:702:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6F774A45-2A9F-4873-A5DC-766D030C8CCD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:731:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D3A0A2D6-9259-4A35-A236-F4BEE986C1FD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:740:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "49C3A8E5-FA6A-4EF3-BF50-FD4E1576024F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:750:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "ABA8AB4E-3FE6-46A8-847E-660C5DF6CE71"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:751:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6DA4A6F0-C0F1-42CB-8BBD-7198064733EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:752:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8C121CC9-26F6-4103-8EB0-BAFF6B5B5FE8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:753:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "86086D00-10BF-4C55-8D87-82CCBE468153"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:754:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2F25246A-D9E5-4F0D-B91A-478D4E5570DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:755:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "0218695F-C4AD-46BF-B176-F10C644A9C2D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:756:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FC9E7C3E-1005-450A-9198-E014C1BAADBC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:757:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3A177AB1-CC85-46EF-91DF-462096608C9F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:sap_basis:758:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "F7591F81-708C-4285-9BB2-F2B4BDB9759B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://me.sap.com/notes/3458789",
|
|
"source": "cna@sap.com",
|
|
"tags": [
|
|
"Permissions Required"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://url.sap/sapsecuritypatchday",
|
|
"source": "cna@sap.com",
|
|
"tags": [
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |