SAP Business Client, version 7.0, allows an attacker after a successful social engineering attack to inject malicious code as a DLL file in untrusted directories that can be executed by the application, due to uncontrolled search path element. An attacker could thereby control the behavior of the application.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-27394 | SAP Business Client, version 7.0, allows an attacker after a successful social engineering attack to inject malicious code as a DLL file in untrusted directories that can be executed by the application, due to uncontrolled search path element. An attacker could thereby control the behavior of the application. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 27 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:sap:business_client:6.0:-:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level10:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level11:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level12:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level13:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level14:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level15:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level16:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level17:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level1:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level2:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level3:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level4:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level5:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level6:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level7:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level8:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:patch_level9:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:-:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level10:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level11:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level12:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level13:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level14:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level15:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level16:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level17:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level18:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level19:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level1:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level20:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level21:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level22:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level2:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level3:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level4:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level5:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level6:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level7:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level8:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.5:patch_level9:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:-:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level1:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level2:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level3:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level4:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level5:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level6:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level7:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level8:*:*:*:*:*:* cpe:2.3:a:sap:business_client:7.0:patch_level9:*:*:*:*:*:* |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2024-08-04T08:55:22.319Z
Reserved: 2020-01-08T00:00:00
Link: CVE-2020-6244
No data.
Status : Analyzed
Published: 2020-05-12T18:15:13.973
Modified: 2025-05-27T16:50:33.953
Link: CVE-2020-6244
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD