mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
177 lines
6.1 KiB
JSON
177 lines
6.1 KiB
JSON
{
|
|
"id": "CVE-2024-44112",
|
|
"sourceIdentifier": "cna@sap.com",
|
|
"published": "2024-09-10T04:15:04.710",
|
|
"lastModified": "2024-09-16T14:19:24.917",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Due to missing authorization check in SAP for Oil & Gas (Transportation and Distribution), an attacker authenticated as a non-administrative user could call a remote-enabled function which will allow them to delete non-sensitive entries in a user data table. There is no effect on confidentiality or availability."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Debido a la falta de verificaci\u00f3n de autorizaci\u00f3n en SAP para petr\u00f3leo y gas (transporte y distribuci\u00f3n), un atacante autenticado como usuario no administrativo podr\u00eda llamar a una funci\u00f3n habilitada de forma remota que le permita eliminar entradas no confidenciales en una tabla de datos de usuario. No hay ning\u00fan efecto sobre la confidencialidad o la disponibilidad."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cna@sap.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
|
"baseScore": 4.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 1.4
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
|
"baseScore": 4.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cna@sap.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-862"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:600:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8E4FDD2B-B5BA-45E3-9E3C-1DE16EE7F8A4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:602:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E37B0E5D-5F45-4325-BCBE-14868058C02E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:603:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E2D57ACB-6555-4BC1-BDA4-C1AEE627FDBC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:604:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E8AC6142-D03B-4437-907D-F80C2FD6C18C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:605:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "796F8470-CA51-42C4-B03A-97A02617E6D7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:606:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "48701B07-F944-4A55-B43F-8827DD0F3F4A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:617:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7B575B79-8F75-4B9F-9379-BBDB126D139F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:618:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "77D5E396-0DA6-49A5-A66B-1A4A3D14C646"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:800:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "90F7113F-DA15-4F74-BD77-39D8A9FC9E7C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:802:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5FF8F332-0BCC-4DCA-B7ED-15936FE73DC3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:803:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AACBC4D0-3EC8-4F1E-BBCA-60F736CA4D41"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:804:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "4A6D519D-D774-43E2-A4D0-B41443B6C8E4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:805:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "593CF420-1660-43E1-BCBC-DBE877784A85"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:806:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "83271FF6-2026-4735-9BD8-E5D328CB6753"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:807:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FF3686DE-F526-473D-A8D2-02F94FE0D385"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://me.sap.com/notes/3505293",
|
|
"source": "cna@sap.com",
|
|
"tags": [
|
|
"Permissions Required"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://url.sap/sapsecuritypatchday",
|
|
"source": "cna@sap.com",
|
|
"tags": [
|
|
"Patch"
|
|
]
|
|
}
|
|
]
|
|
} |