5.4
CVE-2023-29189
- EPSS 0.27%
- Veröffentlicht 11.04.2023 04:16:09
- Zuletzt bearbeitet 21.11.2024 07:56:41
- Quelle cna@sap.com
- Teams Watchlist Login
- Unerledigt Login
SAP CRM (WebClient UI) - versions S4FND 102, 103, 104, 105, 106, 107, WEBCUIF, 700, 701, 731, 730, 746, 747, 748, 800, 801, allows an authenticated attacker to modify HTTP verbs used in requests to the web server. This application is exposed over the network and successful exploitation can lead to exposure of form fields
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
SAP ≫ Customer Relationship Management S4fnd Version102
SAP ≫ Customer Relationship Management S4fnd Version103
SAP ≫ Customer Relationship Management S4fnd Version104
SAP ≫ Customer Relationship Management S4fnd Version105
SAP ≫ Customer Relationship Management Webclient Ui Version700
SAP ≫ Customer Relationship Management Webclient Ui Version701
SAP ≫ Customer Relationship Management Webclient Ui Version730
SAP ≫ Customer Relationship Management Webclient Ui Version731
SAP ≫ Customer Relationship Management Webclient Ui Version746
SAP ≫ Customer Relationship Management Webclient Ui Version747
SAP ≫ Customer Relationship Management Webclient Ui Version748
SAP ≫ Customer Relationship Management Webclient Ui Version800
SAP ≫ Customer Relationship Management Webclient Ui Version801
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.27% | 0.499 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
|
cna@sap.com | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
|
CWE-23 Relative Path Traversal
The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.