Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pfpv-6wg2-46jw

Опубликовано: 13 дек. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

In some SAP standard roles in SAP Business Planning and Consolidation - versions - SAP_BW 750, 751, 752, 753, 754, 755, 756, 757, DWCORE 200, 300, CPMBPC 810, a transaction code reserved for the customer is used. By implementing such transaction code, a malicious user may execute unauthorized transaction functionality. Under specific circumstances, a successful attack could enable an adversary to escalate their privileges to be able to read, change or delete system data.

In some SAP standard roles in SAP Business Planning and Consolidation - versions - SAP_BW 750, 751, 752, 753, 754, 755, 756, 757, DWCORE 200, 300, CPMBPC 810, a transaction code reserved for the customer is used. By implementing such transaction code, a malicious user may execute unauthorized transaction functionality. Under specific circumstances, a successful attack could enable an adversary to escalate their privileges to be able to read, change or delete system data.

EPSS

Процентиль: 55%
0.0032
Низкий

7.5 High

CVSS3

Дефекты

CWE-269

Связанные уязвимости

CVSS3: 8.5
nvd
около 3 лет назад

In some SAP standard roles in SAP Business Planning and Consolidation - versions - SAP_BW 750, 751, 752, 753, 754, 755, 756, 757, DWCORE 200, 300, CPMBPC 810, a transaction code reserved for the customer is used. By implementing such transaction code, a malicious user may execute unauthorized transaction functionality. Under specific circumstances, a successful attack could enable an adversary to escalate their privileges to be able to read, change or delete system data.

EPSS

Процентиль: 55%
0.0032
Низкий

7.5 High

CVSS3

Дефекты

CWE-269