SAP

Cloud Connector

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 12.08.2025 02:09:43
  • Last modified 12.08.2025 14:25:33

Due to a missing authorization check in SAP Cloud Connector, an attacker on an adjacent network with low privileges could send a crafted request to the endpoint responsible for testing LDAP connections. A successful exploit could lead to reduced perf...

  • EPSS 0.32%
  • Published 13.02.2024 03:15:09
  • Last modified 13.02.2025 18:17:14

Due to improper validation of certificate in SAP Cloud Connector - version 2.0, attacker can impersonate the genuine servers to interact with SCC breaking the mutual authentication. Hence, the attacker can intercept the request to view/modify sensiti...

  • EPSS 0.05%
  • Published 12.12.2023 02:15:07
  • Last modified 21.11.2024 08:33:35

SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or I...

  • EPSS 0.35%
  • Published 15.09.2021 19:15:09
  • Last modified 21.11.2024 06:09:22

SAP Cloud Connector, version - 2.0, allows the upload of zip files as backup. This backup file can be tricked to inject special elements such as '..' and '/' separators, for attackers to escape outside of the restricted location to access files or di...

  • EPSS 0.13%
  • Published 15.09.2021 19:15:09
  • Last modified 21.11.2024 06:09:22

SAP Cloud Connector, version - 2.0, allows an authenticated administrator to modify a configuration file to inject malicious codes that could potentially lead to OS command execution.

  • EPSS 0.16%
  • Published 15.09.2021 19:15:09
  • Last modified 21.11.2024 06:09:23

SAP Cloud Connector, version - 2.0, does not sufficiently encode user-controlled inputs, allowing an attacker with Administrator rights, to include malicious codes that get stored in the database, and when accessed, could be executed in the applicati...

  • EPSS 0.11%
  • Published 15.09.2021 19:15:09
  • Last modified 21.11.2024 06:09:23

Potentially, SAP Cloud Connector, version - 2.0 communication with the backend is accepted without sufficient validation of the certificate.

  • EPSS 3.35%
  • Published 08.01.2019 20:29:00
  • Last modified 21.11.2024 04:16:34

SAP Cloud Connector, before version 2.11.3, does not perform any authentication checks for functionalities that require user identity.

  • EPSS 0.57%
  • Published 08.01.2019 20:29:00
  • Last modified 21.11.2024 04:16:34

SAP Cloud Connector, before version 2.11.3, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.