The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP request, aka SAP Security Note 2256846.
References
Configurations
History
21 Nov 2024, 02:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/137128/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/145860/SAP-NetWeaver-J2EE-Engine-7.40-SQL-Injection.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2016/May/55 - Exploit, Mailing List, Third Party Advisory | |
References | () https://erpscan.io/advisories/erpscan-16-010-sap-netweaver-7-4-information-disclosure/ - Third Party Advisory | |
References | () https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/ - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/39841/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/43495/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2016-02-16 15:59
Updated : 2024-11-21 02:48
NVD link : CVE-2016-2388
Mitre link : CVE-2016-2388
CVE.ORG link : CVE-2016-2388
JSON object : View
Products Affected
sap
- netweaver_application_server_java
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor