SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2912939 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775 | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2912939 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/2912939 - Permissions Required | |
References | () https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775 - Vendor Advisory |
Information
Published : 2020-06-10 13:15
Updated : 2024-11-21 05:35
NVD link : CVE-2020-6275
Mitre link : CVE-2020-6275
CVE.ORG link : CVE-2020-6275
JSON object : View
Products Affected
sap
- netweaver_application_server_abap
CWE
CWE-918
Server-Side Request Forgery (SSRF)