2 results (0.002 seconds)

CVSS: 8.1EPSS: 0%CPEs: 2EXPL: 0

Due to misconfigured application endpoints, SAP SuccessFactors attachment APIs allow attackers with user privileges to perform activities with admin privileges over the network. These APIs were consumed in the SF Mobile application for Time Off, Time Sheet, EC Workflow, and Benefits. On successful exploitation, the attacker can read/write attachments. Thus, compromising the confidentiality and integrity of the application Debido a los endpoints de la aplicación configurados inapropiadamente, las APIs de adjuntos de SAP SuccessFactors permiten a atacantes privilegiados de usuario llevar a cabo actividades con privilegios de administrador a través de la red. Estas APIs fueron consumidas en la aplicación SF Mobile para Time Off, Time Sheet, EC Workflow y Benefits. • https://launchpad.support.sap.com/#/notes/3226411 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-269: Improper Privilege Management •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

A vulnerability has been identified in SAP SuccessFactors Mobile Application for Android - versions older than 2108, which allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service, which can lead to denial of service. The vulnerability is related to Android implementation methods that are widely used across Android mobile applications, and such methods are embedded into the SAP SuccessFactors mobile application. These Android methods begin executing once the user accesses their profile on the mobile application. While executing, it can also pick up the activities from other Android applications that are running in the background of the users device and are using the same types of methods in the application. Such vulnerability can also lead to phishing attacks that can be used for staging other types of attacks. • https://launchpad.support.sap.com/#/notes/3077635 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983 •