René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

121 lines
4.1 KiB
JSON

{
"id": "CVE-2018-2451",
"sourceIdentifier": "cna@sap.com",
"published": "2018-08-14T16:29:01.693",
"lastModified": "2020-08-24T17:37:01.140",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "XS Command-Line Interface (CLI) user sessions with the SAP HANA Extended Application Services (XS), version 1, advanced server may have an unintentional prolonged period of validity. Consequently, a platform user could access controller resources via active CLI session even after corresponding authorizations have been revoked meanwhile by an administrator user. Similarly, an attacker who managed to gain access to the platform user's session might misuse the session token even after the session has been closed."
},
{
"lang": "es",
"value": "En las sesiones de usuario XS Command-Line Interface (CLI) con SAP HANA Extended Application Services (XS), versi\u00f3n 1, el servidor avanzado podr\u00eda tener un per\u00edodo de validez prolongado no intencionado. En consecuencia, un usuario de la plataforma podr\u00eda acceder a recursos del controlador mediante una sesi\u00f3n de la interfaz de l\u00ednea de comandos activa incluso despu\u00e9s de que las autorizaciones correspondientes hayan sido revocadas por un usuario administrador. De manera similar, un atacante que consigue obtener acceso a la sesi\u00f3n de usuario de la plataforma podr\u00eda emplear err\u00f3neamente el token de sesi\u00f3n incluso despu\u00e9s de que se haya cerrado la sesi\u00f3n."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:hana_extended_application_services:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F314AEB2-7F5C-4CD8-8DD5-359B75FCD9C5"
}
]
}
]
}
],
"references": [
{
"url": "http://www.securityfocus.com/bid/105091",
"source": "cna@sap.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://launchpad.support.sap.com/#/notes/2590705",
"source": "cna@sap.com",
"tags": [
"Permissions Required",
"Vendor Advisory"
]
},
{
"url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499352742",
"source": "cna@sap.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}