mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 09:11:28 +00:00
64 lines
2.7 KiB
JSON
64 lines
2.7 KiB
JSON
{
|
|
"id": "CVE-2024-47585",
|
|
"sourceIdentifier": "cna@sap.com",
|
|
"published": "2024-12-10T01:15:06.437",
|
|
"lastModified": "2024-12-10T01:15:06.437",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "SAP NetWeaver Application Server for ABAP and ABAP Platform allows an authenticated attacker to gain higher access levels than they should have by exploiting improper authorization checks, resulting in privilege escalation. While authorizations for import and export are distinguished, a single authorization is applied for both, which may contribute to these risks. On successful exploitation, this can result in potential security concerns. However, it has no impact on the integrity and availability of the application and may have only a low impact on data confidentiality."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "SAP NetWeaver Application Server para ABAP y ABAP Platform permite a un atacante autenticado obtener niveles de acceso m\u00e1s altos de los que deber\u00eda al explotar comprobaciones de autorizaci\u00f3n incorrectas, lo que da como resultado una escalada de privilegios. Si bien se distinguen las autorizaciones para la importaci\u00f3n y la exportaci\u00f3n, se aplica una \u00fanica autorizaci\u00f3n para ambas, lo que puede contribuir a estos riesgos. Si se explota con \u00e9xito, esto puede generar posibles problemas de seguridad. Sin embargo, no tiene ning\u00fan impacto en la integridad y la disponibilidad de la aplicaci\u00f3n y puede tener solo un impacto bajo en la confidencialidad de los datos."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "cna@sap.com",
|
|
"type": "Secondary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
|
"baseScore": 4.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"attackVector": "NETWORK",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"availabilityImpact": "NONE"
|
|
},
|
|
"exploitabilityScore": 2.8,
|
|
"impactScore": 1.4
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "cna@sap.com",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-862"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://me.sap.com/notes/3536361",
|
|
"source": "cna@sap.com"
|
|
},
|
|
{
|
|
"url": "https://url.sap/sapsecuritypatchday",
|
|
"source": "cna@sap.com"
|
|
}
|
|
]
|
|
} |