The SAP Gateway, versions 7.5, 7.51, 7.52 and 7.53, allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it's not.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:16
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html - Exploit, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/109074 - Third Party Advisory, VDB Entry | |
References | () https://cxsecurity.com/ascii/WLB-2019050283 - Third Party Advisory | |
References | () https://drive.google.com/open?id=1aGFqggvydehSK7MFIsfKW7tO60yiF55f - Exploit, Third Party Advisory | |
References | () https://launchpad.support.sap.com/#/notes/2752614 - Permissions Required, Vendor Advisory | |
References | () https://launchpad.support.sap.com/#/notes/2911267 - | |
References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575 - Vendor Advisory |
Information
Published : 2019-07-10 19:15
Updated : 2024-11-21 04:16
NVD link : CVE-2019-0319
Mitre link : CVE-2019-0319
CVE.ORG link : CVE-2019-0319
JSON object : View
Products Affected
sap
- ui5
- gateway