CVE-2025-42955
- EPSS 0.06%
- Veröffentlicht 12.08.2025 02:09:43
- Zuletzt bearbeitet 12.08.2025 14:25:33
Due to a missing authorization check in SAP Cloud Connector, an attacker on an adjacent network with low privileges could send a crafted request to the endpoint responsible for testing LDAP connections. A successful exploit could lead to reduced perf...
CVE-2024-25642
- EPSS 0.32%
- Veröffentlicht 13.02.2024 03:15:09
- Zuletzt bearbeitet 13.02.2025 18:17:14
Due to improper validation of certificate in SAP Cloud Connector - version 2.0, attacker can impersonate the genuine servers to interact with SCC breaking the mutual authentication. Hence, the attacker can intercept the request to view/modify sensiti...
CVE-2023-49578
- EPSS 0.05%
- Veröffentlicht 12.12.2023 02:15:07
- Zuletzt bearbeitet 21.11.2024 08:33:35
SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or I...
CVE-2021-33692
- EPSS 0.35%
- Veröffentlicht 15.09.2021 19:15:09
- Zuletzt bearbeitet 21.11.2024 06:09:22
SAP Cloud Connector, version - 2.0, allows the upload of zip files as backup. This backup file can be tricked to inject special elements such as '..' and '/' separators, for attackers to escape outside of the restricted location to access files or di...
CVE-2021-33693
- EPSS 0.13%
- Veröffentlicht 15.09.2021 19:15:09
- Zuletzt bearbeitet 21.11.2024 06:09:22
SAP Cloud Connector, version - 2.0, allows an authenticated administrator to modify a configuration file to inject malicious codes that could potentially lead to OS command execution.
CVE-2021-33694
- EPSS 0.16%
- Veröffentlicht 15.09.2021 19:15:09
- Zuletzt bearbeitet 21.11.2024 06:09:23
SAP Cloud Connector, version - 2.0, does not sufficiently encode user-controlled inputs, allowing an attacker with Administrator rights, to include malicious codes that get stored in the database, and when accessed, could be executed in the applicati...
CVE-2021-33695
- EPSS 0.11%
- Veröffentlicht 15.09.2021 19:15:09
- Zuletzt bearbeitet 21.11.2024 06:09:23
Potentially, SAP Cloud Connector, version - 2.0 communication with the backend is accepted without sufficient validation of the certificate.
CVE-2019-0246
- EPSS 3.35%
- Veröffentlicht 08.01.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:34
SAP Cloud Connector, before version 2.11.3, does not perform any authentication checks for functionalities that require user identity.
CVE-2019-0247
- EPSS 0.57%
- Veröffentlicht 08.01.2019 20:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:34
SAP Cloud Connector, before version 2.11.3, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.