Page 2 of 9 results (0.005 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

An unauthenticated attacker in SAP NetWeaver AS for Java - version 7.50, due to improper access control, can attach to an open interface and make use of an open naming and directory API to access services which can be used to perform unauthorized operations affecting users and data on the current system. This could allow the attacker to have full read access to user data, make modifications to user data, and make services within the system unavailable. • https://launchpad.support.sap.com/#/notes/3268093 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-284: Improper Access Control •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

An unauthenticated user can use functions of XML Data Archiving Service of SAP NetWeaver Application Server for Java - version 7.50, to which access should be restricted. This may result in an escalation of privileges. Un usuario no autenticado puede usar funciones del Servicio de Archivo de Datos XML de SAP NetWeaver Application Server for Java - versión 7.50, cuyo acceso debería estar restringido. Esto puede resultar en una escalada de privilegios • https://launchpad.support.sap.com/#/notes/3152442 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-862: Missing Authorization •

CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0

SAP NetWeaver AS for JAVA, versions - 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker authenticated as an administrator to connect over a network and submit a specially crafted XML file in the application because of missing XML Validation, this vulnerability enables attacker to fully compromise confidentiality by allowing them to read any file on the filesystem or fully compromise availability by causing the system to crash. The attack cannot be used to change any data so that there is no compromise as to integrity. SAP NetWeaver AS para JAVA, versiones - 7.20, 7.30, 7.31, 7.40, 7.50, permite a un atacante autenticado como administrador conectarse a través de una red y enviar un archivo XML especialmente diseñado en la aplicación debido a que falta la comprobación XML; esta vulnerabilidad habilita al atacante comprometer completamente la confidencialidad al permitirles leer cualquier archivo en el sistema de archivos o comprometer completamente la disponibilidad al causar que el sistema se bloquee. El ataque no puede ser usado para cambiar ningún dato, de modo que no se comprometa la integridad • http://packetstormsecurity.com/files/164592/SAP-JAVA-NetWeaver-System-Connections-XML-Injection.html http://seclists.org/fulldisclosure/2021/Oct/28 https://launchpad.support.sap.com/#/notes/3053066 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0

Information Disclosure vulnerability in UserAdmin application in SAP NetWeaver Application Server for Java, versions - 7.11,7.20,7.30,7.31,7.40 and 7.50 allows attackers to access restricted information by entering malicious server name. Una vulnerabilidad de divulgación de información en la aplicación UserAdmin en SAP NetWeaver Application Server para Java, versiones - 7.11,7.20,7.30,7.31,7.40 y 7.50, permite a atacantes acceder a información restringida al ingresar el nombre del servidor malicioso • https://launchpad.support.sap.com/#/notes/3023299 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 •