CVE-2020-6271
https://notcve.org/view.php?id=CVE-2020-6271
SAP Solution Manager (Problem Context Manager), version 7.2, does not perform the necessary authentication, allowing an attacker to consume large amounts of memory, causing the system to crash and read restricted data (files visible for technical administration users of the diagnostics agent). SAP Solution Manager (Problem Context Manager), versión 7.2, no realiza la autenticación necesaria, lo que permite a un atacante consumir grandes cantidades de memoria, causando que el sistema se bloquee y lea datos restringidos (archivos visibles para usuarios de administración técnica del agente de diagnóstico) • https://launchpad.support.sap.com/#/notes/2931391 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775 • CWE-91: XML Injection (aka Blind XPath Injection) •
CVE-2020-6235
https://notcve.org/view.php?id=CVE-2020-6235
SAP Solution Manager (Diagnostics Agent), version 7.2, does not perform the authentication check for the functionalities of the Collector Simulator, leading to Missing Authentication. SAP Solution Manager (Diagnostics Agent), versión 7.2, no lleva a cabo la comprobación de autenticación para las funcionalidades del Collector Simulator, conllevando a una Falta de Autenticación. • https://launchpad.support.sap.com/#/notes/2906994 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=544214202 • CWE-306: Missing Authentication for Critical Function •
CVE-2019-0307
https://notcve.org/view.php?id=CVE-2019-0307
Diagnostics Agent in Solution Manager, version 7.2, stores several credentials such as SLD user connection as well as Solman user communication in the SAP Secure Storage file which is not encrypted by default. By decoding these credentials, an attacker with admin privileges could gain access to the entire configuration, but no system sensitive information can be gained. Diagnostics Agent en Solution Manager, versión 7.2, almacena varias credenciales, como la conexión de usuario de SLD y la comunicación de usuario de Solman en el archivo SAP Secure Storage que no está cifrado de forma predeterminada. Al descodificar estas credenciales, un atacante con privilegios de administrador podría obtener acceso a toda la configuración, pero no se puede obtener información confidencial del sistema. • https://launchpad.support.sap.com/#/notes/2772266 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242 • CWE-311: Missing Encryption of Sensitive Data •
CVE-2019-0291
https://notcve.org/view.php?id=CVE-2019-0291
Under certain conditions Solution Manager, version 7.2, allows an attacker to access information which would otherwise be restricted. Bajo ciertas condiciones, Solution Manager, versión 7.2, le permite a un atacante acceder a información que de otra manera sería restringida. • http://www.securityfocus.com/bid/108313 https://launchpad.support.sap.com/#/notes/2748699 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=520259032 •
CVE-2016-10005 – SAP Solman 7.31 Information Disclosure
https://notcve.org/view.php?id=CVE-2016-10005
Webdynpro in SAP Solman 7.1 through 7.31 allows remote attackers to obtain sensitive information via webdynpro/dispatcher/sap.com/caf~eu~gp~example~timeoff~wd requests, aka SAP Security Note 2344524. Webdynpro en SAP Solman 7.1 hasta la versión 7.31 permite a atacantes remotos obtener información sensible a través de la petición webdynpro/dispatcher/sap.com/caf~eu~gp~example~timeoff~wd, vulnerabilidad también conocida como SAP Security Note 2344524. SAP Solman versions 7.1 through 7.31 suffer from an information disclosure vulnerability. • http://packetstormsecurity.com/files/140232/SAP-Solman-7.31-Information-Disclosure.html http://seclists.org/fulldisclosure/2016/Dec/69 http://www.securityfocus.com/bid/92949 https://erpscan.io/advisories/erpscan-16-035-sap-solman-user-accounts-dislosure • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •