2025-02-16 03:03:51 +00:00

64 lines
2.2 KiB
JSON

{
"id": "CVE-2025-23191",
"sourceIdentifier": "cna@sap.com",
"published": "2025-02-11T01:15:10.557",
"lastModified": "2025-02-11T01:15:10.557",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cached values belonging to the SAP OData endpoint in SAP Fiori for SAP ERP could be poisoned by modifying the Host header value in an HTTP GET request. An attacker could alter the `atom:link` values in the returned metadata redirecting them from the SAP server to a malicious link set by the attacker. Successful exploitation could cause low impact on integrity of the application."
},
{
"lang": "es",
"value": "Los valores almacenados en cach\u00e9 que pertenecen al endpoint SAP OData en SAP Fiori para SAP ERP podr\u00edan verse afectados si se modifica el valor del encabezado Host en una solicitud HTTP GET. Un atacante podr\u00eda alterar los valores `atom:link` en los metadatos devueltos y redirigirlos desde el servidor SAP a un enlace malicioso establecido por el atacante. Una explotaci\u00f3n exitosa podr\u00eda causar un impacto bajo en la integridad de la aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-644"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3426825",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}