Description
SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-27425 | SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database. |
References
History
No history.
Status: PUBLISHED
Assigner: sap
Published:
Updated: 2024-08-04T08:55:22.250Z
Reserved: 2020-01-08T00:00:00.000Z
Link: CVE-2020-6275
No data.
Status : Modified
Published: 2020-06-10T13:15:18.667
Modified: 2024-11-21T05:35:25.340
Link: CVE-2020-6275
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD