fkie_cve-2025-26658
Vulnerability from fkie_nvd
Published
2025-03-11 01:15
Modified
2025-03-11 01:15
Severity ?
Summary
The Service Layer in SAP Business One, allows attackers to potentially gain unauthorized access and impersonate other users in the application to perform unauthorized actions. Due to the improper session management, the attackers can elevate themselves to higher privilege and can read, modify and/or write new data. To gain authenticated sessions of other users, the attacker must invest considerable time and effort. This vulnerability has a high impact on the confidentiality and integrity of the application with no effect on the availability of the application.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Service Layer in SAP Business One, allows attackers to potentially gain unauthorized access and impersonate other users in the application to perform unauthorized actions. Due to the improper session management, the attackers can elevate themselves to higher privilege and can read, modify and/or write new data. To gain authenticated sessions of other users, the attacker must invest considerable time and effort. This vulnerability has a high impact on the confidentiality and integrity of the application with no effect on the availability of the application." }, { "lang": "es", "value": "La capa de servicio de SAP Business One permite a los atacantes obtener acceso no autorizado y hacerse pasar por otros usuarios de la aplicaci\u00f3n para realizar acciones no autorizadas. Gracias a la gesti\u00f3n incorrecta de las sesiones, los atacantes pueden obtener privilegios superiores y leer, modificar o escribir datos nuevos. Para obtener sesiones autenticadas de otros usuarios, el atacante debe invertir mucho tiempo y esfuerzo. Esta vulnerabilidad tiene un gran impacto en la confidencialidad e integridad de la aplicaci\u00f3n, sin afectar a su disponibilidad. " } ], "id": "CVE-2025-26658", "lastModified": "2025-03-11T01:15:35.533", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 5.2, "source": "cna@sap.com", "type": "Primary" } ] }, "published": "2025-03-11T01:15:35.533", "references": [ { "source": "cna@sap.com", "url": "https://me.sap.com/notes/3561045" }, { "source": "cna@sap.com", "url": "https://url.sap/sapsecuritypatchday" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-384" } ], "source": "cna@sap.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…