Vulnerabilites related to sap - ui5
Vulnerability from fkie_nvd
Published
2018-06-12 15:29
Modified
2024-11-21 04:03
Severity ?
9.8 (Critical) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to malicious user-provided JavaScript code being added to the DOM that could steal user information. Software components affected are: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Java) 7.30, 7.31, 7.40, 7,50; SAP UI 7.40, 7.50, 7.51, 7.52, and version 2.0 of SAP UI for SAP NetWeaver 7.00
References
▶ | URL | Tags | |
---|---|---|---|
cna@sap.com | http://www.securityfocus.com/bid/104459 | Third Party Advisory, VDB Entry | |
cna@sap.com | https://launchpad.support.sap.com/#/notes/2538856 | Permissions Required, Vendor Advisory | |
cna@sap.com | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=495289255 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104459 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/2538856 | Permissions Required, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=495289255 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:hana_database:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "528C05CB-315F-465C-8C25-EF85AA7D19B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:hana_database:2.00:*:*:*:*:*:*:*", "matchCriteriaId": "4C6CA542-7071-48B6-B135-3AE9B4BB1DC5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui:2.0:*:*:*:*:netweaver_7.0:*:*", "matchCriteriaId": "BAC1FC47-D27B-4D31-B0CB-84CB75B9B314", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui:7.40:*:*:*:*:*:*:*", "matchCriteriaId": "6A245CAD-2365-48F5-994D-65658825DA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "FD311636-17EB-4DEA-8A9B-9539B4B43C3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "2AE480CB-D830-42D5-B297-3D5874AEFA36", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "830F67FF-0DEA-4B07-A3E0-CDCD01888DED", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "DFBC9A13-184E-403D-9F4C-435A46A3F92A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5_java:7.30:*:*:*:*:*:*:*", "matchCriteriaId": "500E7A87-9E8C-464D-9316-F4F2FDECFDA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5_java:7.31:*:*:*:*:*:*:*", "matchCriteriaId": "C959F430-EF52-48FE-838D-40B87019B61D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5_java:7.40:*:*:*:*:*:*:*", "matchCriteriaId": "FC625547-85B8-4E19-B7DC-32BC25603F3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5_java:7.50:*:*:*:*:*:*:*", "matchCriteriaId": "F01D0C09-61E9-48CE-8440-9513B79845B2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to malicious user-provided JavaScript code being added to the DOM that could steal user information. Software components affected are: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Java) 7.30, 7.31, 7.40, 7,50; SAP UI 7.40, 7.50, 7.51, 7.52, and version 2.0 of SAP UI for SAP NetWeaver 7.00" }, { "lang": "es", "value": "SAP UI5 no valid\u00f3 las entradas de usuario antes de a\u00f1adirlas a la estructura DOM. Esto podr\u00eda conducir a que se a\u00f1ada al DOM c\u00f3digo JavaScript malicioso proporcionado por el usuario que podr\u00eda robar informaci\u00f3n del usuario. Los componentes de software afectados son: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Java) 7.30, 7.31, 7.40, 7,50; SAP UI 7.40, 7.50, 7.51, 7.52 y la versi\u00f3n 2.0 de SAP UI para SAP NetWeaver 7.00" } ], "id": "CVE-2018-2424", "lastModified": "2024-11-21T04:03:47.570", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "cna@sap.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-06-12T15:29:00.307", "references": [ { "source": "cna@sap.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104459" }, { "source": "cna@sap.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2538856" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=495289255" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104459" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2538856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=495289255" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-02-09 21:15
Modified
2024-11-21 05:48
Severity ?
Summary
SAP UI5 versions before 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1 allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
References
▶ | URL | Tags | |
---|---|---|---|
cna@sap.com | https://launchpad.support.sap.com/#/notes/3014303 | Permissions Required, Third Party Advisory | |
cna@sap.com | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=568460543 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://launchpad.support.sap.com/#/notes/3014303 | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=568460543 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:ui5:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6980394-2B06-4660-B495-E81FF13058CA", "versionEndExcluding": "1.38.49", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FE5AAFE-6AFB-4F3C-9919-650611936BD7", "versionEndExcluding": "1.52.49", "versionStartIncluding": "1.50.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5:*:*:*:*:*:*:*:*", "matchCriteriaId": "F88A1AE9-FF5E-4842-9C0E-A6C3DBB79CE6", "versionEndExcluding": "1.60.34", "versionStartIncluding": "1.60.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A1646B5-02CE-480C-91CC-D9F7FD48AB0D", "versionEndExcluding": "1.71.31", "versionStartIncluding": "1.71.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5:*:*:*:*:*:*:*:*", "matchCriteriaId": "53D55323-DA22-4D9A-9D9D-4372A86BEF65", "versionEndExcluding": "1.78.18", "versionStartIncluding": "1.78.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BD70F05-C64D-4F82-A7AB-D512720211F2", "versionEndExcluding": "1.84.5", "versionStartIncluding": "1.84.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5:*:*:*:*:*:*:*:*", "matchCriteriaId": "06FE28A7-74C3-4976-8CA7-FE446F85CD84", "versionEndExcluding": "1.85.4", "versionStartIncluding": "1.85.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D89B55D-5557-44B8-A80C-212135299C08", "versionEndExcluding": "1.86.1", "versionStartIncluding": "1.86.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SAP UI5 versions before 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1 allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities." }, { "lang": "es", "value": "SAP UI5, versiones anteriores a: 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1, permite a un atacante no autenticado redireccionar a usuarios a un sitio malicioso debido a vulnerabilidades de tipo Tabnabbing Inverso" } ], "id": "CVE-2021-21476", "lastModified": "2024-11-21T05:48:26.950", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@sap.com", "type": "Secondary" } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-02-09T21:15:13.533", "references": [ { "source": "cna@sap.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/3014303" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=568460543" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/3014303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=568460543" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-601" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2019-07-10 19:15
Modified
2024-11-21 04:16
Severity ?
Summary
The SAP Gateway, versions 7.5, 7.51, 7.52 and 7.53, allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it's not.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:gateway:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "55156CCE-56A8-43FD-87C3-1A4849656FBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:gateway:7.51:*:*:*:*:*:*:*", "matchCriteriaId": "1165027E-EAC9-4163-B2BC-0FD2E76D1665", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:gateway:7.52:*:*:*:*:*:*:*", "matchCriteriaId": "014A32BF-E695-4382-AE81-0209846FA99D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:gateway:7.53:*:*:*:*:*:*:*", "matchCriteriaId": "4E8220FC-05F3-4BE7-AF38-3BD917C5631A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:ui5:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A38FF70-E888-4768-82A8-3A44620F1F6A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SAP Gateway, versions 7.5, 7.51, 7.52 and 7.53, allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it\u0027s not." }, { "lang": "es", "value": "SAP Gateway, versiones 7.5, 7.51, 7.52 y 7.53, permite a un atacante inyectar contenido que es desplegado en forma de mensaje de error. Por lo tanto, un atacante podr\u00eda enga\u00f1ar a un usuario para que crea que esta informaci\u00f3n es de servicio leg\u00edtimo cuando no lo es." } ], "id": "CVE-2019-0319", "lastModified": "2024-11-21T04:16:40.700", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-07-10T19:15:10.220", "references": [ { "source": "cna@sap.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html" }, { "source": "cna@sap.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/109074" }, { "source": "cna@sap.com", "tags": [ "Third Party Advisory" ], "url": "https://cxsecurity.com/ascii/WLB-2019050283" }, { "source": "cna@sap.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://drive.google.com/open?id=1aGFqggvydehSK7MFIsfKW7tO60yiF55f" }, { "source": "cna@sap.com", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2752614" }, { "source": "cna@sap.com", "url": "https://launchpad.support.sap.com/#/notes/2911267" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/109074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cxsecurity.com/ascii/WLB-2019050283" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://drive.google.com/open?id=1aGFqggvydehSK7MFIsfKW7tO60yiF55f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Vendor Advisory" ], "url": "https://launchpad.support.sap.com/#/notes/2752614" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://launchpad.support.sap.com/#/notes/2911267" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" }, { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
CVE-2018-2424 (GCVE-0-2018-2424)
Vulnerability from cvelistv5
Published
2018-06-12 15:00
Modified
2024-08-05 04:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Cross-Site Scripting
Summary
SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to malicious user-provided JavaScript code being added to the DOM that could steal user information. Software components affected are: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Java) 7.30, 7.31, 7.40, 7,50; SAP UI 7.40, 7.50, 7.51, 7.52, and version 2.0 of SAP UI for SAP NetWeaver 7.00
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | SAP SE | SAP HANA Database |
Version: 1.0 Version: 2.0 |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:21:33.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2538856" }, { "name": "104459", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104459" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=495289255" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP HANA Database", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "1.0" }, { "status": "affected", "version": "2.0" } ] }, { "product": "SAP UI5", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "1.0" } ] }, { "product": "SAP UI5(Java)", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "7.3" }, { "status": "affected", "version": "7.31" }, { "status": "affected", "version": "7.40" }, { "status": "affected", "version": "7.50" } ] }, { "product": "SAP UI", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "7.40" }, { "status": "affected", "version": "7.50" }, { "status": "affected", "version": "7.51" }, { "status": "affected", "version": "7.52" } ] }, { "product": "SAP UI for SAP NetWeaver 7.00", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "2.0" } ] } ], "datePublic": "2018-06-12T00:00:00", "descriptions": [ { "lang": "en", "value": "SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to malicious user-provided JavaScript code being added to the DOM that could steal user information. Software components affected are: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Java) 7.30, 7.31, 7.40, 7,50; SAP UI 7.40, 7.50, 7.51, 7.52, and version 2.0 of SAP UI for SAP NetWeaver 7.00" } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Cross-Site Scripting", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-06-15T09:57:01", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/2538856" }, { "name": "104459", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104459" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=495289255" } ], "source": { "discovery": "UNKNOWN" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2018-2424", "STATE": "PUBLIC", "vendor_name": "SAP SE" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP HANA Database", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.0" }, { "version_affected": "=", "version_value": "2.0" } ] } }, { "product_name": "SAP UI5", "version": { "version_data": [ { "version_affected": "=", "version_value": "1.0" } ] } }, { "product_name": "SAP UI5(Java)", "version": { "version_data": [ { "version_affected": "=", "version_value": "7.3" }, { "version_affected": "=", "version_value": "7.31" }, { "version_affected": "=", "version_value": "7.40" }, { "version_affected": "=", "version_value": "7.50" } ] } }, { "product_name": "SAP UI", "version": { "version_data": [ { "version_affected": "=", "version_value": "7.40" }, { "version_affected": "=", "version_value": "7.50" }, { "version_affected": "=", "version_value": "7.51" }, { "version_affected": "=", "version_value": "7.52" } ] } }, { "product_name": "SAP UI for SAP NetWeaver 7.00", "version": { "version_data": [ { "version_affected": "=", "version_value": "2.0" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP UI5 did not validate user input before adding it to the DOM structure. This may lead to malicious user-provided JavaScript code being added to the DOM that could steal user information. Software components affected are: SAP Hana Database 1.00, 2.00; SAP UI5 1.00; SAP UI5 (Java) 7.30, 7.31, 7.40, 7,50; SAP UI 7.40, 7.50, 7.51, 7.52, and version 2.0 of SAP UI for SAP NetWeaver 7.00" } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Cross-Site Scripting" } ] } ] }, "references": { "reference_data": [ { "name": "https://launchpad.support.sap.com/#/notes/2538856", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/2538856" }, { "name": "104459", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104459" }, { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=495289255", "refsource": "CONFIRM", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=495289255" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2018-2424", "datePublished": "2018-06-12T15:00:00", "dateReserved": "2017-12-15T00:00:00", "dateUpdated": "2024-08-05T04:21:33.271Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-0319 (GCVE-0-2019-0319)
Vulnerability from cvelistv5
Published
2019-07-10 18:51
Modified
2024-08-04 17:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Content Injection
Summary
The SAP Gateway, versions 7.5, 7.51, 7.52 and 7.53, allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it's not.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
SAP SE | SAP Gateway |
Version: < 7.5 Version: < 7.51 Version: < 7.52 Version: < 7.53 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:44:16.458Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "109074", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/109074" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2752614" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://cxsecurity.com/ascii/WLB-2019050283" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://drive.google.com/open?id=1aGFqggvydehSK7MFIsfKW7tO60yiF55f" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/2911267" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP Gateway", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c 7.5" }, { "status": "affected", "version": "\u003c 7.51" }, { "status": "affected", "version": "\u003c 7.52" }, { "status": "affected", "version": "\u003c 7.53" } ] } ], "descriptions": [ { "lang": "en", "value": "The SAP Gateway, versions 7.5, 7.51, 7.52 and 7.53, allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it\u0027s not." } ], "problemTypes": [ { "descriptions": [ { "description": "Content Injection", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-06-09T12:46:08", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "name": "109074", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/109074" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/2752614" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575" }, { "tags": [ "x_refsource_MISC" ], "url": "https://cxsecurity.com/ascii/WLB-2019050283" }, { "tags": [ "x_refsource_MISC" ], "url": "https://drive.google.com/open?id=1aGFqggvydehSK7MFIsfKW7tO60yiF55f" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/2911267" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2019-0319", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP Gateway", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "7.5" }, { "version_name": "\u003c", "version_value": "7.51" }, { "version_name": "\u003c", "version_value": "7.52" }, { "version_name": "\u003c", "version_value": "7.53" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SAP Gateway, versions 7.5, 7.51, 7.52 and 7.53, allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it\u0027s not." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Content Injection" } ] } ] }, "references": { "reference_data": [ { "name": "109074", "refsource": "BID", "url": "http://www.securityfocus.com/bid/109074" }, { "name": "https://launchpad.support.sap.com/#/notes/2752614", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/2752614" }, { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575", "refsource": "CONFIRM", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575" }, { "name": "https://cxsecurity.com/ascii/WLB-2019050283", "refsource": "MISC", "url": "https://cxsecurity.com/ascii/WLB-2019050283" }, { "name": "https://drive.google.com/open?id=1aGFqggvydehSK7MFIsfKW7tO60yiF55f", "refsource": "MISC", "url": "https://drive.google.com/open?id=1aGFqggvydehSK7MFIsfKW7tO60yiF55f" }, { "name": "http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html" }, { "name": "https://launchpad.support.sap.com/#/notes/2911267", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/2911267" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2019-0319", "datePublished": "2019-07-10T18:51:55", "dateReserved": "2018-11-26T00:00:00", "dateUpdated": "2024-08-04T17:44:16.458Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-21476 (GCVE-0-2021-21476)
Vulnerability from cvelistv5
Published
2021-02-09 20:44
Modified
2024-08-03 18:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Tabnabbing
Summary
SAP UI5 versions before 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1 allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:16:22.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=568460543" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://launchpad.support.sap.com/#/notes/3014303" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "SAP UI5", "vendor": "SAP SE", "versions": [ { "status": "affected", "version": "\u003c 1.38.49" }, { "status": "affected", "version": "\u003c 1.52.49" }, { "status": "affected", "version": "\u003c 1.60.34" }, { "status": "affected", "version": "\u003c 1.71.31" }, { "status": "affected", "version": "\u003c 1.78.18" }, { "status": "affected", "version": "\u003c 1.84.5" }, { "status": "affected", "version": "\u003c 1.85.4" }, { "status": "affected", "version": "\u003c 1.86.1" } ] } ], "descriptions": [ { "lang": "en", "value": "SAP UI5 versions before 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1 allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Tabnabbing", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-03T15:55:27", "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "shortName": "sap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=568460543" }, { "tags": [ "x_refsource_MISC" ], "url": "https://launchpad.support.sap.com/#/notes/3014303" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2021-21476", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP UI5", "version": { "version_data": [ { "version_name": "\u003c", "version_value": "1.38.49" }, { "version_name": "\u003c", "version_value": "1.52.49" }, { "version_name": "\u003c", "version_value": "1.60.34" }, { "version_name": "\u003c", "version_value": "1.71.31" }, { "version_name": "\u003c", "version_value": "1.78.18" }, { "version_name": "\u003c", "version_value": "1.84.5" }, { "version_name": "\u003c", "version_value": "1.85.4" }, { "version_name": "\u003c", "version_value": "1.86.1" } ] } } ] }, "vendor_name": "SAP SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP UI5 versions before 1.38.49, 1.52.49, 1.60.34, 1.71.31, 1.78.18, 1.84.5, 1.85.4, 1.86.1 allows an unauthenticated attacker to redirect users to a malicious site due to Reverse Tabnabbing vulnerabilities." } ] }, "impact": { "cvss": { "baseScore": "4.7", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.0" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Tabnabbing" } ] } ] }, "references": { "reference_data": [ { "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=568460543", "refsource": "MISC", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=568460543" }, { "name": "https://launchpad.support.sap.com/#/notes/3014303", "refsource": "MISC", "url": "https://launchpad.support.sap.com/#/notes/3014303" } ] } } } }, "cveMetadata": { "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd", "assignerShortName": "sap", "cveId": "CVE-2021-21476", "datePublished": "2021-02-09T20:44:32", "dateReserved": "2020-12-30T00:00:00", "dateUpdated": "2024-08-03T18:16:22.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }