2024-09-10 14:03:33 +00:00

64 lines
2.0 KiB
JSON

{
"id": "CVE-2024-45283",
"sourceIdentifier": "cna@sap.com",
"published": "2024-09-10T05:15:12.207",
"lastModified": "2024-09-10T12:09:50.377",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver AS for Java allows an authorized attacker to obtain sensitive information. The attacker could obtain the username and password when creating an RFC destination. After successful exploitation, an attacker can read the sensitive information but cannot modify or delete the data."
},
{
"lang": "es",
"value": "SAP NetWeaver AS para Java permite a un atacante autorizado obtener informaci\u00f3n confidencial. El atacante podr\u00eda obtener el nombre de usuario y la contrase\u00f1a al crear un destino RFC. Despu\u00e9s de una explotaci\u00f3n exitosa, un atacante puede leer la informaci\u00f3n confidencial, pero no puede modificar ni eliminar los datos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.5,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-256"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3477359",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}