In SAP Business Workflow and SAP Flexible Workflow, an authenticated attacker can manipulate a parameter in an otherwise legitimate resource request to view sensitive information that should otherwise be restricted. The attacker does not have the ability to modify the information or to make the information unavailable.
History

Tue, 14 Jan 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Jan 2025 00:45:00 +0000

Type Values Removed Values Added
Description In SAP Business Workflow and SAP Flexible Workflow, an authenticated attacker can manipulate a parameter in an otherwise legitimate resource request to view sensitive information that should otherwise be restricted. The attacker does not have the ability to modify the information or to make the information unavailable.
Title Information Disclosure vulnerability in SAP Business Workflow and SAP Flexible Workflow
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published: 2025-01-14T00:08:59.323Z

Updated: 2025-01-14T15:00:38.824Z

Reserved: 2024-12-05T21:38:15.279Z

Link: CVE-2025-0058

cve-icon Vulnrichment

Updated: 2025-01-14T15:00:33.754Z

cve-icon NVD

Status : Received

Published: 2025-01-14T01:15:16.040

Modified: 2025-01-14T01:15:16.040

Link: CVE-2025-0058

cve-icon Redhat

No data.