Description
SAP Business Client, version 7.0, allows an attacker after a successful social engineering attack to inject malicious code as a DLL file in untrusted directories that can be executed by the application, due to uncontrolled search path element. An attacker could thereby control the behavior of the application.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-27394 | SAP Business Client, version 7.0, allows an attacker after a successful social engineering attack to inject malicious code as a DLL file in untrusted directories that can be executed by the application, due to uncontrolled search path element. An attacker could thereby control the behavior of the application. |
References
History
Tue, 27 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sap:business_client:6.0:-:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level10:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level11:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level12:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level13:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level14:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level15:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level16:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level17:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level1:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level2:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level3:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level4:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level5:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level6:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level7:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level8:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level9:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:-:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level10:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level11:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level12:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level13:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level14:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level15:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level16:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level17:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level18:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level19:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level1:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level20:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level21:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level22:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level2:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level3:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level4:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level5:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level6:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level7:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level8:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level9:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:-:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level1:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level2:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level3:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level4:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level5:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level6:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level7:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level8:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level9:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2024-08-04T08:55:22.319Z
Reserved: 2020-01-08T00:00:00.000Z
Link: CVE-2020-6244
No data.
Status : Analyzed
Published: 2020-05-12T18:15:13.973
Modified: 2025-05-27T16:50:33.953
Link: CVE-2020-6244
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD