mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
64 lines
2.6 KiB
JSON
64 lines
2.6 KiB
JSON
{
|
|
"id": "CVE-2024-34687",
|
|
"sourceIdentifier": "cna@sap.com",
|
|
"published": "2024-05-14T16:17:26.143",
|
|
"lastModified": "2024-05-14T19:17:55.627",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "SAP NetWeaver Application Server for ABAP and ABAP Platform do not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability.\nAn attacker can control code that is executed within a user\u2019s browser, which could result in modification, deletion of data, including accessing or deleting files, or stealing session cookies which an attacker could use to hijack a user\u2019s session. Hence, this could have impact on Confidentiality, Integrity and Availability of the system.\n"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "SAP NetWeaver Application Server para ABAP y la plataforma ABAP no codifican suficientemente las entradas controladas por el usuario, lo que genera una vulnerabilidad de Cross Site Scripting (XSS). Un atacante puede controlar el c\u00f3digo que se ejecuta dentro del navegador de un usuario, lo que podr\u00eda dar como resultado la modificaci\u00f3n, la eliminaci\u00f3n de datos, incluido el acceso o la eliminaci\u00f3n de archivos, o el robo de cookies de sesi\u00f3n que un atacante podr\u00eda usar para secuestrar la sesi\u00f3n de un usuario. Por lo tanto, esto podr\u00eda tener un impacto en la confidencialidad, la integridad y la disponibilidad del sistema."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cna@sap.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "CHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "LOW",
|
|
"availabilityImpact": "LOW",
|
|
"baseScore": 6.5,
|
|
"baseSeverity": "MEDIUM"
|
|
},
|
|
"exploitabilityScore": 2.3,
|
|
"impactScore": 3.7
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cna@sap.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-79"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://me.sap.com/notes/3448445",
|
|
"source": "cna@sap.com"
|
|
},
|
|
{
|
|
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html",
|
|
"source": "cna@sap.com"
|
|
}
|
|
]
|
|
} |