
CVE-2023-40309 – Missing Authorization check in SAP CommonCryptoLib
https://notcve.org/view.php?id=CVE-2023-40309
12 Sep 2023 — SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired, an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data. SAP CommonCryptoLib no realiza las comprobaciones de autenticación necesarias, lo que puede dar como resultado comprobacione... • https://me.sap.com/notes/3340576 • CWE-862: Missing Authorization CWE-863: Incorrect Authorization •

CVE-2023-40308 – Memory Corruption vulnerability in SAP CommonCryptoLib
https://notcve.org/view.php?id=CVE-2023-40308
12 Sep 2023 — SAP CommonCryptoLib allows an unauthenticated attacker to craft a request, which when submitted to an open port causes a memory corruption error in a library which in turn causes the target component to crash making it unavailable. There is no ability to view or modify any information. SAP CommonCryptoLib permite que un atacante no autenticado cree una solicitud que, cuando se envía a un puerto abierto, provoca un error de corrupción de memoria en una librería, lo que a su vez provoca que el componente de t... • https://me.sap.com/notes/3327896 • CWE-476: NULL Pointer Dereference CWE-787: Out-of-bounds Write •

CVE-2019-0364
https://notcve.org/view.php?id=CVE-2019-0364
10 Sep 2019 — Attackers may misuse an HTTP/REST endpoint of SAP HANA Extended Application Services (Advanced model), before version 1.0.118, to enumerate open ports. Los atacantes pueden hacer un uso inapropiado de un end point HTTP/REST de SAP HANA Extended Application Services (modelo Avanzado), anteriores a versión 1.0.118, para enumerar los puertos abiertos. • https://launchpad.support.sap.com/#/notes/2817491 •

CVE-2019-0363
https://notcve.org/view.php?id=CVE-2019-0363
10 Sep 2019 — Attackers may misuse an HTTP/REST endpoint of SAP HANA Extended Application Services (Advanced model), before version 1.0.118, to overload the server or retrieve information about internal network ports. Los atacantes pueden hacer un uso inapropiado de un end point HTTP/REST de SAP HANA Extended Application Services (modelo Avanzado), anteriores a versión 1.0.118, para sobrecargar el servidor o recuperar información sobre los puertos de red internos. • https://launchpad.support.sap.com/#/notes/2817491 •

CVE-2019-0306
https://notcve.org/view.php?id=CVE-2019-0306
12 Jun 2019 — SAP HANA Extended Application Services (advanced model), version 1, allows authenticated low privileged XS Advanced Platform users such as SpaceAuditors to execute requests to obtain a complete list of SAP HANA user IDs and names. Los Servicios de Aplicación Extendidos de SAP HANA (modelo avanzado), versión 1, permiten a los usuarios identificados de la Plataforma Avanzada XS con privilegios bajos, como SpaceAuditors, ejecutar solicitudes para obtener una lista completa de los identificadores y nombres de u... • https://launchpad.support.sap.com/#/notes/2771128 •

CVE-2019-0277
https://notcve.org/view.php?id=CVE-2019-0277
12 Mar 2019 — SAP HANA extended application services, version 1, advanced does not sufficiently validate an XML document accepted from an authenticated developer with privileges to the SAP space (XML External Entity vulnerability). Los servicios de aplicación extendidos de SAP HANA, en su versión 1 avanzada, no validan de manera suficiente un documento XML que se recibe desde cualquier desarrollador autenticado con privilegios para el espacio SAP (vulnerabilidad XXE). • http://www.securityfocus.com/bid/107356 • CWE-611: Improper Restriction of XML External Entity Reference •

CVE-2019-0266
https://notcve.org/view.php?id=CVE-2019-0266
15 Feb 2019 — Under certain conditions SAP HANA Extended Application Services, version 1.0, advanced model (XS advanced) writes credentials of platform users to a trace file of the SAP HANA system. Even though this trace file is protected from unauthorized access, the risk of leaking information is increased. En determinadas condiciones, SAP HANA Extended Application Services, en su versión 1.0 de modelo avanzado (XS advanced) escribe las credenciales de los usuarios de la plataforma en un archivo de rastreo del sistema ... • http://www.securityfocus.com/bid/106988 • CWE-532: Insertion of Sensitive Information into Log File •

CVE-2018-2451
https://notcve.org/view.php?id=CVE-2018-2451
14 Aug 2018 — XS Command-Line Interface (CLI) user sessions with the SAP HANA Extended Application Services (XS), version 1, advanced server may have an unintentional prolonged period of validity. Consequently, a platform user could access controller resources via active CLI session even after corresponding authorizations have been revoked meanwhile by an administrator user. Similarly, an attacker who managed to gain access to the platform user's session might misuse the session token even after the session has been clos... • http://www.securityfocus.com/bid/105091 • CWE-613: Insufficient Session Expiration •

CVE-2018-2378
https://notcve.org/view.php?id=CVE-2018-2378
14 Feb 2018 — In SAP HANA Extended Application Services, 1.0, unauthorized users can read statistical data about deployed applications including resource consumption. En SAP HANA Extended Application Services 1.0, los usuarios no autorizados pueden leer datos estadísticos sobre las aplicaciones desplegadas, incluyendo el consumo de recursos. • https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018 •

CVE-2018-2375
https://notcve.org/view.php?id=CVE-2018-2375
14 Feb 2018 — In SAP HANA Extended Application Services, 1.0, a controller user who has SpaceAuditor authorization in a specific space could retrieve application environments within that space. En SAP HANA Extended Application Services 1.0, un usuario controller que tenga la autorización SpaceAuditor en un espacio específico podría recuperar entornos de la aplicación en ese espacio. • https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018 •