mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-12-13 18:34:37 +00:00
64 lines
2.5 KiB
JSON
64 lines
2.5 KiB
JSON
{
|
|
"id": "CVE-2025-0059",
|
|
"sourceIdentifier": "cna@sap.com",
|
|
"published": "2025-01-14T01:15:16.190",
|
|
"lastModified": "2025-01-14T01:15:16.190",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Applications based on SAP GUI for HTML in SAP NetWeaver Application Server ABAP store user input in the local browser storage to improve usability. An attacker with administrative privileges or access to the victim\ufffds user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": " Las aplicaciones basadas en SAP GUI para HTML en SAP NetWeaver Application Server ABAP almacenan la informaci\u00f3n ingresada por el usuario en el almacenamiento local del navegador para mejorar la usabilidad. Un atacante con privilegios administrativos o acceso al directorio de usuarios de la v\u00edctima en el nivel del sistema operativo podr\u00eda leer estos datos. Dependiendo de la informaci\u00f3n ingresada por el usuario en las transacciones, los datos divulgados podr\u00edan variar desde datos no cr\u00edticos hasta datos altamente sensibles, lo que causa un alto impacto en la confidencialidad de la aplicaci\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cna@sap.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
|
"baseScore": 6.0,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "HIGH",
|
|
"userInteraction": "NONE",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 1.5,
|
|
"impactScore": 4.0
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cna@sap.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-497"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://me.sap.com/notes/3503138",
|
|
"source": "cna@sap.com"
|
|
},
|
|
{
|
|
"url": "https://url.sap/sapsecuritypatchday",
|
|
"source": "cna@sap.com"
|
|
}
|
|
]
|
|
} |