SAP IDES ECC-systems contain code that permits the execution of arbitrary program code of user's choice.An attacker can therefore control the behaviour of the system by executing malicious code which can potentially escalate privileges with low impact on confidentiality, integrity and availability of the system.
References
Link | Resource |
---|---|
https://me.sap.com/notes/3421659 | Permissions Required |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Configurations
History
16 Oct 2024, 21:21
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
CPE | cpe:2.3:a:sap:ides_ecc:*:*:*:*:*:*:*:* | |
References | () https://me.sap.com/notes/3421659 - Permissions Required | |
References | () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory | |
First Time |
Sap
Sap ides Ecc |
13 Feb 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-13 03:15
Updated : 2024-10-16 21:21
NVD link : CVE-2024-22132
Mitre link : CVE-2024-22132
CVE.ORG link : CVE-2024-22132
JSON object : View
Products Affected
sap
- ides_ecc
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')