René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

88 lines
3.0 KiB
JSON

{
"id": "CVE-2015-7828",
"sourceIdentifier": "cve@mitre.org",
"published": "2015-11-10T17:59:05.507",
"lastModified": "2015-11-12T19:44:35.483",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "SAP HANA Database 1.00 SPS10 and earlier do not require authentication, which allows remote attackers to execute arbitrary code or have unspecified other impact via a TrexNet packet to the (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop, or (17) pythonexec method, aka SAP Security Note 2165583."
},
{
"lang": "es",
"value": "SAP HANA Database 1.00 SPS10 y anteriores no requiere autenticaci\u00f3n, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario o tener otro impacto no especificado a trav\u00e9s de un paquete TrexNet al m\u00e9todo (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop o (17) pythonexec, tambi\u00e9n conocida como SAP Security Note 2165583."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sap:hana:*:sp10:*:*:*:*:*:*",
"versionEndIncluding": "1.00",
"matchCriteriaId": "6E3AEABF-FB14-43B0-9D5D-5A3206F199DD"
}
]
}
]
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2015/Nov/36",
"source": "cve@mitre.org"
},
{
"url": "https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition",
"source": "cve@mitre.org"
}
]
}