2024-12-15 03:03:56 +00:00

64 lines
2.3 KiB
JSON

{
"id": "CVE-2024-54198",
"sourceIdentifier": "cna@sap.com",
"published": "2024-12-10T01:15:06.713",
"lastModified": "2024-12-10T01:15:06.713",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In certain conditions, SAP NetWeaver Application Server ABAP allows an authenticated attacker to craft a Remote Function Call (RFC) request to restricted destinations, which can be used to expose credentials for a remote service. These credentials can then be further exploited to completely compromise the remote service, potentially resulting in a significant impact on the confidentiality, integrity, and availability of the application."
},
{
"lang": "es",
"value": "En determinadas condiciones, SAP NetWeaver Application Server ABAP permite a un atacante autenticado manipular una solicitud de llamada a funci\u00f3n remota (RFC) a destinos restringidos, que se puede utilizar para exponer las credenciales de un servicio remoto. Estas credenciales se pueden explotar posteriormente para comprometer por completo el servicio remoto, lo que podr\u00eda tener un impacto significativo en la confidencialidad, integridad y disponibilidad de la aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-914"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3469791",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}