CVE-2020-26836 – SAP Solution Manager 7.2 (ST 720) Open Redirection
https://notcve.org/view.php?id=CVE-2020-26836
SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack. SAP Solution Manager (Trace Analysis), versión 720, permite el uso inapropiado de un parámetro en la URL la aplicación conllevando a una vulnerabilidad de Redireccionamiento Abierto, un atacante puede ingresar un enlace a un sitio malicioso que podría engañar al usuario para que introduzca credenciales o descargue un software malicioso, tal y como un parámetro en la URL de la aplicación y compartirlo con el usuario final quien podría potencialmente convertirse en una víctima del ataque SAP Solution Manager version 7.2 (ST 720) suffers from an open redirection vulnerability. • http://packetstormsecurity.com/files/163136/SAP-Solution-Manager-7.2-ST-720-Open-Redirection.html http://seclists.org/fulldisclosure/2021/Jun/25 https://launchpad.support.sap.com/#/notes/2938650 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •
CVE-2020-26837
https://notcve.org/view.php?id=CVE-2020-26837
SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, allows an authenticated user to upload a malicious script that can exploit an existing path traversal vulnerability to compromise confidentiality exposing elements of the file system, partially compromise integrity allowing the modification of some configurations and partially compromise availability by making certain services unavailable. SAP Solution Manager versión 7.2 (User Experience Monitoring), versión - 7.2, permite a un usuario autenticado cargar un script malicioso que puede explotar una vulnerabilidad de salto de ruta existente para comprometer la confidencialidad exponiendo elementos del sistema de archivos, comprometiendo parcialmente la integridad permitiendo la modificación de algunas configuraciones. y comprometer parcialmente la disponibilidad al hacer que determinados servicios no estén disponibles • http://packetstormsecurity.com/files/163160/SAP-Solution-Manager-7.2-File-Disclosure-Denial-Of-Service.html http://seclists.org/fulldisclosure/2021/Jun/32 https://launchpad.support.sap.com/#/notes/2983204 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •
CVE-2020-26830
https://notcve.org/view.php?id=CVE-2020-26830
SAP Solution Manager 7.2 (User Experience Monitoring), version - 7.2, does not perform necessary authorization checks for an authenticated user. Due to inadequate access control, a network attacker authenticated as a regular user can use operations which should be restricted to administrators. These operations can be used to Change the User Experience Monitoring configuration, obtain details about the configured SAP Solution Manager agents, Deploy a malicious User Experience Monitoring script. SAP Solution Manager versión 7.2 (User Experience Monitoring), versión - 7.2, no lleva a cabo las comprobaciones de autorización necesarias para un usuario autenticado. Debido a un control de acceso inadecuado, un atacante de red autenticado como usuario normal puede utilizar operaciones que deberían estar restringidas a los administradores. • http://packetstormsecurity.com/files/163161/SAP-Solution-Manager-7.2-Missing-Authorization.html http://seclists.org/fulldisclosure/2021/Jun/29 https://launchpad.support.sap.com/#/notes/2983204 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079 • CWE-862: Missing Authorization •
CVE-2020-26823
https://notcve.org/view.php?id=CVE-2020-26823
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the Upgrade Diagnostics Agent Connection Service, this has an impact to the integrity and availability of the service. SAP Solution Manager (JAVA stack), versión - 7.20, permite a un atacante no autenticado comprometer el sistema debido a una falta de comprobación de autorización en Upgrade Diagnostics Agent Connection Service, esto presenta un impacto en la integridad y disponibilidad del servicio • https://launchpad.support.sap.com/#/notes/2985866 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571 • CWE-306: Missing Authentication for Critical Function •
CVE-2020-26821
https://notcve.org/view.php?id=CVE-2020-26821
SAP Solution Manager (JAVA stack), version - 7.20, allows an unauthenticated attacker to compromise the system because of missing authorization checks in the SVG Converter Service, this has an impact to the integrity and availability of the service. SAP Solution Manager (JAVA stack), versión - 7.20, permite a un atacante no autenticado comprometer el sistema debido a una falta de comprobación de autorización en SVG Converter Service, esto presenta un impacto en la integridad y disponibilidad del servicio • https://launchpad.support.sap.com/#/notes/2985866 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571 • CWE-306: Missing Authentication for Critical Function •