Описание
In SAP ABA (Application Basis) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I, an attacker authenticated as a user with a remote execution authorization can use a vulnerable interface. This allows the attacker to use the interface to invoke an application function to perform actions which they would not normally be permitted to perform. Depending on the function executed, the attack can read or modify any user/business data and can make the entire system unavailable.
Ссылки
- Permissions Required
- Vendor Advisory
- Permissions Required
- Vendor Advisory
Уязвимые конфигурации
Одно из
EPSS
9.1 Critical
CVSS3
7.2 High
CVSS3
Дефекты
Связанные уязвимости
In SAP ABA (Application Basis) - versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75I, an attacker authenticated as a user with a remote execution authorization can use a vulnerable interface. This allows the attacker to use the interface to invoke an application function to perform actions which they would not normally be permitted to perform. Depending on the function executed, the attack can read or modify any user/business data and can make the entire system unavailable.
Уязвимость платформы для обеспечения функционирования приложений SAP ABA (Application Basis), связанная с неверным управлением генерацией кода, позволяющая нарушителю получить доступ на чтение и изменение данных или вызвать отказ в обслуживании
EPSS
9.1 Critical
CVSS3
7.2 High
CVSS3