fkie_cve-2024-44112
Vulnerability from fkie_nvd
Published
2024-09-10 04:15
Modified
2024-09-16 14:19
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Summary
Due to missing authorization check in SAP for Oil & Gas (Transportation and Distribution), an attacker authenticated as a non-administrative user could call a remote-enabled function which will allow them to delete non-sensitive entries in a user data table. There is no effect on confidentiality or availability.
References
▶ | URL | Tags | |
---|---|---|---|
cna@sap.com | https://me.sap.com/notes/3505293 | Permissions Required | |
cna@sap.com | https://url.sap/sapsecuritypatchday | Patch |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sap | oil_\%\/_gas | 600 | |
sap | oil_\%\/_gas | 602 | |
sap | oil_\%\/_gas | 603 | |
sap | oil_\%\/_gas | 604 | |
sap | oil_\%\/_gas | 605 | |
sap | oil_\%\/_gas | 606 | |
sap | oil_\%\/_gas | 617 | |
sap | oil_\%\/_gas | 618 | |
sap | oil_\%\/_gas | 800 | |
sap | oil_\%\/_gas | 802 | |
sap | oil_\%\/_gas | 803 | |
sap | oil_\%\/_gas | 804 | |
sap | oil_\%\/_gas | 805 | |
sap | oil_\%\/_gas | 806 | |
sap | oil_\%\/_gas | 807 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:600:*:*:*:*:*:*:*", "matchCriteriaId": "8E4FDD2B-B5BA-45E3-9E3C-1DE16EE7F8A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:602:*:*:*:*:*:*:*", "matchCriteriaId": "E37B0E5D-5F45-4325-BCBE-14868058C02E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:603:*:*:*:*:*:*:*", "matchCriteriaId": "E2D57ACB-6555-4BC1-BDA4-C1AEE627FDBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:604:*:*:*:*:*:*:*", "matchCriteriaId": "E8AC6142-D03B-4437-907D-F80C2FD6C18C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:605:*:*:*:*:*:*:*", "matchCriteriaId": "796F8470-CA51-42C4-B03A-97A02617E6D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:606:*:*:*:*:*:*:*", "matchCriteriaId": "48701B07-F944-4A55-B43F-8827DD0F3F4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:617:*:*:*:*:*:*:*", "matchCriteriaId": "7B575B79-8F75-4B9F-9379-BBDB126D139F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:618:*:*:*:*:*:*:*", "matchCriteriaId": "77D5E396-0DA6-49A5-A66B-1A4A3D14C646", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:800:*:*:*:*:*:*:*", "matchCriteriaId": "90F7113F-DA15-4F74-BD77-39D8A9FC9E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:802:*:*:*:*:*:*:*", "matchCriteriaId": "5FF8F332-0BCC-4DCA-B7ED-15936FE73DC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:803:*:*:*:*:*:*:*", "matchCriteriaId": "AACBC4D0-3EC8-4F1E-BBCA-60F736CA4D41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:804:*:*:*:*:*:*:*", "matchCriteriaId": "4A6D519D-D774-43E2-A4D0-B41443B6C8E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:805:*:*:*:*:*:*:*", "matchCriteriaId": "593CF420-1660-43E1-BCBC-DBE877784A85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:806:*:*:*:*:*:*:*", "matchCriteriaId": "83271FF6-2026-4735-9BD8-E5D328CB6753", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:807:*:*:*:*:*:*:*", "matchCriteriaId": "FF3686DE-F526-473D-A8D2-02F94FE0D385", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Due to missing authorization check in SAP for Oil \u0026 Gas (Transportation and Distribution), an attacker authenticated as a non-administrative user could call a remote-enabled function which will allow them to delete non-sensitive entries in a user data table. There is no effect on confidentiality or availability." }, { "lang": "es", "value": "Debido a la falta de verificaci\u00f3n de autorizaci\u00f3n en SAP para petr\u00f3leo y gas (transporte y distribuci\u00f3n), un atacante autenticado como usuario no administrativo podr\u00eda llamar a una funci\u00f3n habilitada de forma remota que le permita eliminar entradas no confidenciales en una tabla de datos de usuario. No hay ning\u00fan efecto sobre la confidencialidad o la disponibilidad." } ], "id": "CVE-2024-44112", "lastModified": "2024-09-16T14:19:24.917", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "cna@sap.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-09-10T04:15:04.710", "references": [ { "source": "cna@sap.com", "tags": [ "Permissions Required" ], "url": "https://me.sap.com/notes/3505293" }, { "source": "cna@sap.com", "tags": [ "Patch" ], "url": "https://url.sap/sapsecuritypatchday" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-862" } ], "source": "cna@sap.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…