CVE-2017-6950

SAP GUI 7.2 through 7.5 allows remote attackers to bypass intended security policy restrictions and execute arbitrary code via a crafted ABAP code, aka SAP Security Note 2407616.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sap:gui_for_windows:7.20:*:*:*:*:*:*:*
cpe:2.3:a:sap:gui_for_windows:7.30:*:*:*:*:*:*:*
cpe:2.3:a:sap:gui_for_windows:7.40_core_sp00-sp011:*:*:*:*:*:*:*
cpe:2.3:a:sap:gui_for_windows:7.50_core_sp000:*:*:*:*:*:*:*

History

21 Nov 2024, 03:30

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/96872 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96872 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038122 - () http://www.securitytracker.com/id/1038122 -
References () https://erpscan.io/advisories/erpscan-17-011-sap-gui-versions-remote-code-execution-bypass-security-policy/ - () https://erpscan.io/advisories/erpscan-17-011-sap-gui-versions-remote-code-execution-bypass-security-policy/ -

Information

Published : 2017-03-23 20:59

Updated : 2024-11-21 03:30


NVD link : CVE-2017-6950

Mitre link : CVE-2017-6950

CVE.ORG link : CVE-2017-6950


JSON object : View

Products Affected

sap

  • gui_for_windows
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource