Lucene search

K
cve[email protected]CVE-2020-6324
HistorySep 09, 2020 - 2:15 p.m.

CVE-2020-6324

2020-09-0914:15:12
CWE-79
web.nvd.nist.gov
26
2
sap
netweaver
as abap
bsp
test application
sbspext_table
cve-2020-6324
reflected cross site scripting

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.8%

SAP Netweaver AS ABAP(BSP Test Application sbspext_table), version-700,701,720,730,731,740,750,751,752,753,754,755, allows an unauthenticated attacker to send polluted URL to the victim, when the victim clicks on this URL, the attacker can read, modify the information available in the victimοΏ½s browser leading to Reflected Cross Site Scripting.

Affected configurations

NVD
Node
sapnetweaver_as_abap_business_server_pagesMatch700
OR
sapnetweaver_as_abap_business_server_pagesMatch701
OR
sapnetweaver_as_abap_business_server_pagesMatch702
OR
sapnetweaver_as_abap_business_server_pagesMatch730
OR
sapnetweaver_as_abap_business_server_pagesMatch731
OR
sapnetweaver_as_abap_business_server_pagesMatch740
OR
sapnetweaver_as_abap_business_server_pagesMatch750
OR
sapnetweaver_as_abap_business_server_pagesMatch751
OR
sapnetweaver_as_abap_business_server_pagesMatch752
OR
sapnetweaver_as_abap_business_server_pagesMatch753
OR
sapnetweaver_as_abap_business_server_pagesMatch754
OR
sapnetweaver_as_abap_business_server_pagesMatch755

CNA Affected

[
  {
    "product": "SAP NetWeaver AS ABAP (BSP Test Application)",
    "vendor": "SAP SE",
    "versions": [
      {
        "status": "affected",
        "version": "< 700"
      },
      {
        "status": "affected",
        "version": "< 701"
      },
      {
        "status": "affected",
        "version": "< 702"
      },
      {
        "status": "affected",
        "version": "< 730"
      },
      {
        "status": "affected",
        "version": "< 731"
      },
      {
        "status": "affected",
        "version": "< 740"
      },
      {
        "status": "affected",
        "version": "< 750"
      },
      {
        "status": "affected",
        "version": "< 751"
      },
      {
        "status": "affected",
        "version": "< 752"
      },
      {
        "status": "affected",
        "version": "< 753"
      },
      {
        "status": "affected",
        "version": "< 754"
      },
      {
        "status": "affected",
        "version": "< 755"
      }
    ]
  }
]

Social References

More

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

38.8%

Related for CVE-2020-6324