Lucene search

K
cve[email protected]CVE-2019-0271
HistoryMar 12, 2019 - 10:29 p.m.

CVE-2019-0271

2019-03-1222:29:00
CWE-20
web.nvd.nist.gov
26
abap server
xml external entity
xee vulnerability
netweaver
suite/erp
security note
cve-2019-0271

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.5 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.1%

ABAP Server (used in NetWeaver and Suite/ERP) and ABAP Platform does not sufficiently validate an XML document accepted from an untrusted source, leading to an XML External Entity (XEE) vulnerability. Fixed in Kernel 7.21 or 7.22, that is ABAP Server 7.00 to 7.31 and Kernel 7.45, 7.49 or 7.53, that is ABAP Server 7.40 to 7.52 or ABAP Platform. For more recent updates please refer to Security Note 2870067 (which supersedes the solution of Security Note 2736825) in the reference section below.

Affected configurations

NVD
Node
sapadvanced_business_application_programming_platformMatch-
OR
sapadvanced_business_application_programming_serverRange7.007.31
OR
sapadvanced_business_application_programming_serverRange7.407.52
Node
sapsap_kernelMatch7.21
OR
sapsap_kernelMatch7.22
OR
sapsap_kernelMatch7.45
OR
sapsap_kernelMatch7.49
OR
sapsap_kernelMatch7.53

CNA Affected

[
  {
    "product": "ABAP Server",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "< from 7.00 to 7.31"
      }
    ]
  },
  {
    "product": "ABAP Server & Platform",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "< from 7.40 to 7.52"
      }
    ]
  }
]

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:N/I:N/A:P

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

6.5 Medium

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

73.1%

Related for CVE-2019-0271