Vulnerabilites related to sap - advanced_business_application_programming_platform_kernel
Vulnerability from fkie_nvd
Published
2019-02-15 18:29
Modified
2024-11-21 04:16
Summary
SLD Registration of ABAP Platform allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. Fixed in versions KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT,KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49,KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49. 7.73 KERNEL from 7.21 to 7.22, 7.45, 7.49, 7.53, 7.73, 7.75.
Impacted products
Vendor Product Version
sap advanced_business_application_programming_platform_kernel *
sap advanced_business_application_programming_platform_kernel 7.45
sap advanced_business_application_programming_platform_kernel 7.49
sap advanced_business_application_programming_platform_kernel 7.53
sap advanced_business_application_programming_platform_kernel 7.73
sap advanced_business_application_programming_platform_kernel 7.75.
sap advanced_business_application_programming_platform_krnl32nuc 7.21
sap advanced_business_application_programming_platform_krnl32nuc 7.21ext
sap advanced_business_application_programming_platform_krnl32nuc 7.22
sap advanced_business_application_programming_platform_krnl32nuc 7.22ext
sap advanced_business_application_programming_platform_krnl32uc 7.21
sap advanced_business_application_programming_platform_krnl32uc 7.21ext
sap advanced_business_application_programming_platform_krnl32uc 7.22
sap advanced_business_application_programming_platform_krnl32uc 7.22ext
sap advanced_business_application_programming_platform_krnl64nuc 7.21
sap advanced_business_application_programming_platform_krnl64nuc 7.21ext
sap advanced_business_application_programming_platform_krnl64nuc 7.22
sap advanced_business_application_programming_platform_krnl64nuc 7.22ext
sap advanced_business_application_programming_platform_krnl64nuc 7.49
sap advanced_business_application_programming_platform_krnl64uc 7.21
sap advanced_business_application_programming_platform_krnl64uc 7.21ext
sap advanced_business_application_programming_platform_krnl64uc 7.22
sap advanced_business_application_programming_platform_krnl64uc 7.22ext
sap advanced_business_application_programming_platform_krnl64uc 7.49
sap advanced_business_application_programming_platform_krnl64uc 7.73



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9691C8B-396D-418C-A890-68AE5867456D",
              "versionEndIncluding": "7.22",
              "versionStartIncluding": "7.21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "3006D7F9-6D11-48A6-899B-2C2955C1A67D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AFDC66-A5C4-4135-9A7F-1778B9DDF2EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB213CC-4C71-4B3A-9D9F-C83594597447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C2954E-3626-4DC7-85CA-241B9E826337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.75.:*:*:*:*:*:*:*",
              "matchCriteriaId": "167F9908-D675-49CA-8983-279E12B5FB11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32nuc:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED21DC1E-A53A-4E92-83F0-7455EBEFA3A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32nuc:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "93910493-4A5E-4E14-B6FD-6A5B175AE664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32nuc:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B9301C-C221-4345-A006-DA7B12E93D1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32nuc:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2B2EC5-A03F-4EBB-BCAF-526DE7EFE2BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32uc:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "940B8331-6D22-418A-9D17-B14DAB035FE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32uc:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D191560-7559-4D90-A593-261C4FD6458D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32uc:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "01A83003-D709-4E48-8CBE-2AA40274ADA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32uc:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "471132DF-5B9A-4124-B75F-A09EA02C9CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "A50F5C48-173B-487A-8DD1-06A921E37602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD2EBEA5-D698-4595-A654-DEA58C948C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A901C3A0-E763-4133-9F1F-CDB5AE45A6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5B551B-0CD5-4800-9A0D-B5B36AD6BCCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED75DB6-7FF6-43CD-9801-7C8410042833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CC9A5B1-F1B2-4804-BABD-2CAEA06BCC42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5D40A13-C630-4E43-A44B-76CAB09FF2C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "26486715-DC64-4AC6-A60D-01254A75C19C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6953A3D-8BD4-45DA-A872-6222CB6C1B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3A6702-3A41-4DA5-B705-AAC77A097AC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "80296DDD-A3B9-4A7F-B831-DC064A85CE38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SLD Registration of ABAP Platform allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. Fixed in versions KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT,KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49,KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49. 7.73 KERNEL from 7.21 to 7.22, 7.45, 7.49, 7.53, 7.73, 7.75."
    },
    {
      "lang": "es",
      "value": "El registro SLD de ABAP Platform permite que un atacante evite que usuarios leg\u00edtimos accedan a un servicio, ya sea cerrando o inundando el mismo. Se ha solucionado en las versiones KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT,KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49,KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT y 7.49. 7.73 KERNEL desde la 7.21 hasta la 7.22, 7.45, 7.49, 7.53, 7.73 y 7.75."
    }
  ],
  "id": "CVE-2019-0265",
  "lastModified": "2024-11-21T04:16:36.090",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-02-15T18:29:01.883",
  "references": [
    {
      "source": "cna@sap.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106972"
    },
    {
      "source": "cna@sap.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/107364"
    },
    {
      "source": "cna@sap.com",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://launchpad.support.sap.com/#/notes/2729710"
    },
    {
      "source": "cna@sap.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106972"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/107364"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://launchpad.support.sap.com/#/notes/2729710"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
    }
  ],
  "sourceIdentifier": "cna@sap.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-611"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-02-15 18:29
Modified
2024-11-21 04:16
Summary
SAP NetWeaver AS ABAP Platform, Krnl64nuc 7.74, krnl64UC 7.73, 7.74, Kernel 7.73, 7.74, 7.75, fails to validate type of installation for an ABAP Server system correctly. That behavior may lead to situation, where business user achieves access to the full SAP Menu, that is 'Easy Access Menu'. The situation can be misused by any user to leverage privileges to business functionality.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C2954E-3626-4DC7-85CA-241B9E826337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "F72516A7-737D-407D-A483-E577993868FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.75.:*:*:*:*:*:*:*",
              "matchCriteriaId": "167F9908-D675-49CA-8983-279E12B5FB11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "68AE511D-175D-4076-8A6F-D988A0799095",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "80296DDD-A3B9-4A7F-B831-DC064A85CE38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DFDC7BE-4A75-4C80-8A5C-79699062DB43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SAP NetWeaver AS ABAP Platform, Krnl64nuc 7.74, krnl64UC 7.73, 7.74, Kernel 7.73, 7.74, 7.75, fails to validate type of installation for an ABAP Server system correctly. That behavior may lead to situation, where business user achieves access to the full SAP Menu, that is \u0027Easy Access Menu\u0027. The situation can be misused by any user to leverage privileges to business functionality."
    },
    {
      "lang": "es",
      "value": "SAP NetWeaver AS ABAP Platform, en Krnl64nuc 7.74, krnl64UC 7.73, 7.74, Kernel 7.73, 7.74, 7.75, fracasa a la hora de validar el tipo de instalaci\u00f3n para un sistema ABAP Server correctamente. Este comportamiento podr\u00eda conducir a una situaci\u00f3n por la cual el usuario de negocio logra acceder al men\u00fa completo de SAP. Esto se conoce como \"Easy Access Menu\". Esta situaci\u00f3n puede ser aprovechada por cualquier usuario para elevar privilegios a la funcionalidad de negocio."
    }
  ],
  "id": "CVE-2019-0255",
  "lastModified": "2024-11-21T04:16:35.257",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-02-15T18:29:00.600",
  "references": [
    {
      "source": "cna@sap.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106987"
    },
    {
      "source": "cna@sap.com",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://launchpad.support.sap.com/#/notes/2723570"
    },
    {
      "source": "cna@sap.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106987"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://launchpad.support.sap.com/#/notes/2723570"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
    }
  ],
  "sourceIdentifier": "cna@sap.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-08-14 15:15
Modified
2024-11-21 04:16
Summary
SAP Kernel (ABAP Debugger), versions KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.49, 7.53, 7.73, 7.75, 7.76, 7.77, allows a user to execute “Go to statement” without possessing the authorization S_DEVELOP DEBUG 02, resulting in Missing Authorization Check



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8EBCD0F-ED63-4C55-9DB4-63DE8F0751CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "B39B9B73-5E07-474D-A537-25F2873FC1D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "D318512C-4F5F-47AD-9F85-1EACCCBF11C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0365B5E-29BD-459C-9160-4A454F39287A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AFDC66-A5C4-4135-9A7F-1778B9DDF2EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB213CC-4C71-4B3A-9D9F-C83594597447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C2954E-3626-4DC7-85CA-241B9E826337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "3087F37A-8D4F-43AC-8E8E-EA7D5E5AF44C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.76:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DB8358E-D73F-4543-9507-86593A6393C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.77:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFA70E06-2DA6-4019-BC72-0118C04D6AF0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SAP Kernel (ABAP Debugger), versions KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.49, 7.53, 7.73, 7.75, 7.76, 7.77, allows a user to execute \u201cGo to statement\u201d without possessing the authorization S_DEVELOP DEBUG 02, resulting in Missing Authorization Check"
    },
    {
      "lang": "es",
      "value": "Kernel de SAP (ABAP Debugger), versiones KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT , 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.49, 7.53, 7.73, 7.75, 7.76, 7.77, le permite al usuario ejecutar \"GO to statement\" sin poseer la autorizaci\u00f3n S_DEVELOP DEBUG 02, lo que resulta en la falta de verificaci\u00f3n de autorizaci\u00f3n"
    }
  ],
  "id": "CVE-2019-0349",
  "lastModified": "2024-11-21T04:16:43.530",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-08-14T15:15:12.017",
  "references": [
    {
      "source": "cna@sap.com",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://launchpad.support.sap.com/#/notes/2798743"
    },
    {
      "source": "cna@sap.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://launchpad.support.sap.com/#/notes/2798743"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017"
    }
  ],
  "sourceIdentifier": "cna@sap.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-03-12 22:29
Modified
2024-11-21 04:16
Summary
ABAP Server of SAP NetWeaver and ABAP Platform fail to perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has been corrected in the following versions: KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.74, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, 7.74, 8.04, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, 7.74, 7.75, 8.04.
Impacted products
Vendor Product Version
sap advanced_business_application_programming_platform_kernel 7.15
sap advanced_business_application_programming_platform_kernel 7.21
sap advanced_business_application_programming_platform_kernel 7.22
sap advanced_business_application_programming_platform_kernel 7.49
sap advanced_business_application_programming_platform_kernel 7.53
sap advanced_business_application_programming_platform_kernel 7.73
sap advanced_business_application_programming_platform_kernel 7.74
sap advanced_business_application_programming_platform_kernel 7.75
sap advanced_business_application_programming_platform_kernel 8.04
sap advanced_business_application_programming_platform_krnl32nuc 7.21
sap advanced_business_application_programming_platform_krnl32nuc 7.21ext
sap advanced_business_application_programming_platform_krnl32nuc 7.22
sap advanced_business_application_programming_platform_krnl32nuc 7.22ext
sap advanced_business_application_programming_platform_krnl32uc 7.21
sap advanced_business_application_programming_platform_krnl32uc 7.21ext
sap advanced_business_application_programming_platform_krnl32uc 7.22
sap advanced_business_application_programming_platform_krnl32uc 7.22ext
sap advanced_business_application_programming_platform_krnl64nuc 7.21
sap advanced_business_application_programming_platform_krnl64nuc 7.21ext
sap advanced_business_application_programming_platform_krnl64nuc 7.22
sap advanced_business_application_programming_platform_krnl64nuc 7.22ext
sap advanced_business_application_programming_platform_krnl64uc 7.21
sap advanced_business_application_programming_platform_krnl64uc 7.21ext
sap advanced_business_application_programming_platform_krnl64uc 7.22
sap advanced_business_application_programming_platform_krnl64uc 7.22ext
sap advanced_business_application_programming_platform_krnl64uc 7.49
sap advanced_business_application_programming_platform_krnl64uc 7.73
sap advanced_business_application_programming_platform_krnl64uc 7.74
sap advanced_business_application_programming_platform_krnl64uc 8.04



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC82D3B-082F-4557-9486-68BB961DF06A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8EBCD0F-ED63-4C55-9DB4-63DE8F0751CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "D318512C-4F5F-47AD-9F85-1EACCCBF11C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AFDC66-A5C4-4135-9A7F-1778B9DDF2EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB213CC-4C71-4B3A-9D9F-C83594597447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C2954E-3626-4DC7-85CA-241B9E826337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "F72516A7-737D-407D-A483-E577993868FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.75:*:*:*:*:*:*:*",
              "matchCriteriaId": "3087F37A-8D4F-43AC-8E8E-EA7D5E5AF44C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:8.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D699689-AEC0-4A19-AC29-7AAE1E4EEA1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32nuc:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED21DC1E-A53A-4E92-83F0-7455EBEFA3A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32nuc:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "93910493-4A5E-4E14-B6FD-6A5B175AE664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32nuc:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B9301C-C221-4345-A006-DA7B12E93D1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32nuc:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2B2EC5-A03F-4EBB-BCAF-526DE7EFE2BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32uc:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "940B8331-6D22-418A-9D17-B14DAB035FE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32uc:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D191560-7559-4D90-A593-261C4FD6458D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32uc:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "01A83003-D709-4E48-8CBE-2AA40274ADA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32uc:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "471132DF-5B9A-4124-B75F-A09EA02C9CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "A50F5C48-173B-487A-8DD1-06A921E37602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD2EBEA5-D698-4595-A654-DEA58C948C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A901C3A0-E763-4133-9F1F-CDB5AE45A6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5B551B-0CD5-4800-9A0D-B5B36AD6BCCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CC9A5B1-F1B2-4804-BABD-2CAEA06BCC42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5D40A13-C630-4E43-A44B-76CAB09FF2C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "26486715-DC64-4AC6-A60D-01254A75C19C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6953A3D-8BD4-45DA-A872-6222CB6C1B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3A6702-3A41-4DA5-B705-AAC77A097AC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "80296DDD-A3B9-4A7F-B831-DC064A85CE38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.74:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DFDC7BE-4A75-4C80-8A5C-79699062DB43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:8.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCA6E11C-842E-468F-A3B6-34FF5315B8E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ABAP Server of SAP NetWeaver and ABAP Platform fail to perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has been corrected in the following versions: KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.74, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, 7.74, 8.04, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, 7.74, 7.75, 8.04."
    },
    {
      "lang": "es",
      "value": "El servidor ABAP de SAP NetWeaver y ABAP Platform no realiza correctamente las comprobaciones de autorizaci\u00f3n necesarias para un usuario autenticado, lo que resulta en un escalado de privilegios. Esto se ha solucionado en las siguientes versiones: KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.74, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, 7.74, 8.04, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, 7.74, 7.75 y 8.04."
    }
  ],
  "id": "CVE-2019-0270",
  "lastModified": "2024-11-21T04:16:36.713",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-03-12T22:29:00.427",
  "references": [
    {
      "source": "cna@sap.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/107377"
    },
    {
      "source": "cna@sap.com",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://launchpad.support.sap.com/#/notes/2727689"
    },
    {
      "source": "cna@sap.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=515408080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/107377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://launchpad.support.sap.com/#/notes/2727689"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=515408080"
    }
  ],
  "sourceIdentifier": "cna@sap.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-06-12 15:29
Modified
2024-11-21 04:16
Severity ?
Summary
FTP Function of SAP NetWeaver AS ABAP Platform, versions- KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, allows an attacker to inject code or specifically manipulated command that can be executed by the application. An attacker could thereby control the behaviour of the application.
Impacted products
Vendor Product Version
sap advanced_business_application_programming_platform_kernel 7.21
sap advanced_business_application_programming_platform_kernel 7.45
sap advanced_business_application_programming_platform_kernel 7.49
sap advanced_business_application_programming_platform_kernel 7.53
sap advanced_business_application_programming_platform_kernel 7.73
sap advanced_business_application_programming_platform_krnl32nuc 7.21
sap advanced_business_application_programming_platform_krnl32nuc 7.21ext
sap advanced_business_application_programming_platform_krnl32nuc 7.22
sap advanced_business_application_programming_platform_krnl32nuc 7.22ext
sap advanced_business_application_programming_platform_krnl32uc 7.21
sap advanced_business_application_programming_platform_krnl32uc 7.21ext
sap advanced_business_application_programming_platform_krnl32uc 7.22
sap advanced_business_application_programming_platform_krnl32uc 7.22ext
sap advanced_business_application_programming_platform_krnl64nuc 7.21
sap advanced_business_application_programming_platform_krnl64nuc 7.21ext
sap advanced_business_application_programming_platform_krnl64nuc 7.22
sap advanced_business_application_programming_platform_krnl64nuc 7.22ext
sap advanced_business_application_programming_platform_krnl64nuc 7.49
sap advanced_business_application_programming_platform_krnl64uc 7.21
sap advanced_business_application_programming_platform_krnl64uc 7.21ext
sap advanced_business_application_programming_platform_krnl64uc 7.22
sap advanced_business_application_programming_platform_krnl64uc 7.22ext
sap advanced_business_application_programming_platform_krnl64uc 7.49
sap advanced_business_application_programming_platform_krnl64uc 7.73



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8EBCD0F-ED63-4C55-9DB4-63DE8F0751CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.45:*:*:*:*:*:*:*",
              "matchCriteriaId": "3006D7F9-6D11-48A6-899B-2C2955C1A67D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2AFDC66-A5C4-4135-9A7F-1778B9DDF2EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.53:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB213CC-4C71-4B3A-9D9F-C83594597447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_kernel:7.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C2954E-3626-4DC7-85CA-241B9E826337",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32nuc:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED21DC1E-A53A-4E92-83F0-7455EBEFA3A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32nuc:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "93910493-4A5E-4E14-B6FD-6A5B175AE664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32nuc:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6B9301C-C221-4345-A006-DA7B12E93D1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32nuc:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2B2EC5-A03F-4EBB-BCAF-526DE7EFE2BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32uc:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "940B8331-6D22-418A-9D17-B14DAB035FE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32uc:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D191560-7559-4D90-A593-261C4FD6458D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32uc:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "01A83003-D709-4E48-8CBE-2AA40274ADA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl32uc:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "471132DF-5B9A-4124-B75F-A09EA02C9CE2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "A50F5C48-173B-487A-8DD1-06A921E37602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD2EBEA5-D698-4595-A654-DEA58C948C78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "A901C3A0-E763-4133-9F1F-CDB5AE45A6E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5B551B-0CD5-4800-9A0D-B5B36AD6BCCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64nuc:7.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED75DB6-7FF6-43CD-9801-7C8410042833",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CC9A5B1-F1B2-4804-BABD-2CAEA06BCC42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.21ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5D40A13-C630-4E43-A44B-76CAB09FF2C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "26486715-DC64-4AC6-A60D-01254A75C19C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.22ext:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6953A3D-8BD4-45DA-A872-6222CB6C1B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.49:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3A6702-3A41-4DA5-B705-AAC77A097AC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sap:advanced_business_application_programming_platform_krnl64uc:7.73:*:*:*:*:*:*:*",
              "matchCriteriaId": "80296DDD-A3B9-4A7F-B831-DC064A85CE38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "FTP Function of SAP NetWeaver AS ABAP Platform, versions- KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, allows an attacker to inject code or specifically manipulated command that can be executed by the application. An attacker could thereby control the behaviour of the application."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n FTP de SAP NetWeaver AS ABAP Platform, versiones- KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22EXT, 7.49, KRNL6464 7.21 EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, permite a un atacante inyectar un c\u00f3digo o un comando espec\u00edficamente manipulado que puede ser ejecutado por la aplicaci\u00f3n. Por lo tanto, un atacante podr\u00eda de este modo controlar el comportamiento de la aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2019-0304",
  "lastModified": "2024-11-21T04:16:39.340",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-06-12T15:29:00.223",
  "references": [
    {
      "source": "cna@sap.com",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://launchpad.support.sap.com/#/notes/2719530"
    },
    {
      "source": "cna@sap.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://launchpad.support.sap.com/#/notes/2719530"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242"
    }
  ],
  "sourceIdentifier": "cna@sap.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-74"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2019-0304
Vulnerability from cvelistv5
Published
2019-06-12 14:21
Modified
2024-08-04 17:44
Severity ?
Summary
FTP Function of SAP NetWeaver AS ABAP Platform, versions- KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, allows an attacker to inject code or specifically manipulated command that can be executed by the application. An attacker could thereby control the behaviour of the application.
Impacted products
Vendor Product Version
SAP SE SAP NetWeaver AS ABAP Platform(KRNL32NUC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Create a notification for this product.
   SAP SE SAP NetWeaver AS ABAP Platform(KRNL32UC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Create a notification for this product.
   SAP SE SAP NetWeaver AS ABAP Platform(KRNL64NUC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Version: < 7.49
Create a notification for this product.
   SAP SE SAP NetWeaver AS ABAP Platform(KRNL64UC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Version: < 7.49
Version: < 7.73
Create a notification for this product.
   SAP SE SAP NetWeaver AS ABAP Platform(KERNEL) Version: < 7.21
Version: < 7.45
Version: < 7.49
Version: < 7.53
Version: < 7.73
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:44:16.439Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://launchpad.support.sap.com/#/notes/2719530"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SAP NetWeaver AS ABAP Platform(KRNL32NUC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            }
          ]
        },
        {
          "product": "SAP NetWeaver AS ABAP Platform(KRNL32UC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            }
          ]
        },
        {
          "product": "SAP NetWeaver AS ABAP Platform(KRNL64NUC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.49"
            }
          ]
        },
        {
          "product": "SAP NetWeaver AS ABAP Platform(KRNL64UC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.49"
            },
            {
              "status": "affected",
              "version": "\u003c 7.73"
            }
          ]
        },
        {
          "product": "SAP NetWeaver AS ABAP Platform(KERNEL)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.45"
            },
            {
              "status": "affected",
              "version": "\u003c 7.49"
            },
            {
              "status": "affected",
              "version": "\u003c 7.53"
            },
            {
              "status": "affected",
              "version": "\u003c 7.73"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "FTP Function of SAP NetWeaver AS ABAP Platform, versions- KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, allows an attacker to inject code or specifically manipulated command that can be executed by the application. An attacker could thereby control the behaviour of the application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Code Injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-12T16:11:08",
        "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
        "shortName": "sap"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://launchpad.support.sap.com/#/notes/2719530"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cna@sap.com",
          "ID": "CVE-2019-0304",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SAP NetWeaver AS ABAP Platform(KRNL32NUC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SAP NetWeaver AS ABAP Platform(KRNL32UC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SAP NetWeaver AS ABAP Platform(KRNL64NUC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.49"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SAP NetWeaver AS ABAP Platform(KRNL64UC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.49"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.73"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SAP NetWeaver AS ABAP Platform(KERNEL)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.45"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.49"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.53"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.73"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "SAP SE"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "FTP Function of SAP NetWeaver AS ABAP Platform, versions- KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, allows an attacker to inject code or specifically manipulated command that can be executed by the application. An attacker could thereby control the behaviour of the application."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Code Injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://launchpad.support.sap.com/#/notes/2719530",
              "refsource": "MISC",
              "url": "https://launchpad.support.sap.com/#/notes/2719530"
            },
            {
              "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242",
              "refsource": "MISC",
              "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=521864242"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
    "assignerShortName": "sap",
    "cveId": "CVE-2019-0304",
    "datePublished": "2019-06-12T14:21:39",
    "dateReserved": "2018-11-26T00:00:00",
    "dateUpdated": "2024-08-04T17:44:16.439Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-0255
Vulnerability from cvelistv5
Published
2019-02-15 18:00
Modified
2024-08-04 17:44
Severity ?
Summary
SAP NetWeaver AS ABAP Platform, Krnl64nuc 7.74, krnl64UC 7.73, 7.74, Kernel 7.73, 7.74, 7.75, fails to validate type of installation for an ABAP Server system correctly. That behavior may lead to situation, where business user achieves access to the full SAP Menu, that is 'Easy Access Menu'. The situation can be misused by any user to leverage privileges to business functionality.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:44:16.318Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://launchpad.support.sap.com/#/notes/2723570"
          },
          {
            "name": "106987",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106987"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-02-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SAP NetWeaver AS ABAP Platform, Krnl64nuc 7.74, krnl64UC 7.73, 7.74, Kernel 7.73, 7.74, 7.75, fails to validate type of installation for an ABAP Server system correctly. That behavior may lead to situation, where business user achieves access to the full SAP Menu, that is \u0027Easy Access Menu\u0027. The situation can be misused by any user to leverage privileges to business functionality."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-02-16T10:57:01",
        "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
        "shortName": "sap"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://launchpad.support.sap.com/#/notes/2723570"
        },
        {
          "name": "106987",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106987"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cna@sap.com",
          "ID": "CVE-2019-0255",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SAP NetWeaver AS ABAP Platform, Krnl64nuc 7.74, krnl64UC 7.73, 7.74, Kernel 7.73, 7.74, 7.75, fails to validate type of installation for an ABAP Server system correctly. That behavior may lead to situation, where business user achieves access to the full SAP Menu, that is \u0027Easy Access Menu\u0027. The situation can be misused by any user to leverage privileges to business functionality."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943",
              "refsource": "MISC",
              "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
            },
            {
              "name": "https://launchpad.support.sap.com/#/notes/2723570",
              "refsource": "MISC",
              "url": "https://launchpad.support.sap.com/#/notes/2723570"
            },
            {
              "name": "106987",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106987"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
    "assignerShortName": "sap",
    "cveId": "CVE-2019-0255",
    "datePublished": "2019-02-15T18:00:00",
    "dateReserved": "2018-11-26T00:00:00",
    "dateUpdated": "2024-08-04T17:44:16.318Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-0270
Vulnerability from cvelistv5
Published
2019-03-12 22:00
Modified
2024-08-04 17:44
Severity ?
Summary
ABAP Server of SAP NetWeaver and ABAP Platform fail to perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has been corrected in the following versions: KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.74, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, 7.74, 8.04, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, 7.74, 7.75, 8.04.
Impacted products
Vendor Product Version
SAP SE ABAP Platform & Server (KRNL32NUC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Create a notification for this product.
   SAP SE ABAP Platform & Server (KRNL32UC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Create a notification for this product.
   SAP SE ABAP Platform & Server (KRNL64NUC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Version: < 7.49
Version: < 7.74
Create a notification for this product.
   SAP SE ABAP Platform & Server (KRNL64UC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Version: < 7.49
Version: < 7.73
Version: < 7.74
Version: < 8.04
Create a notification for this product.
   SAP SE ABAP Platform & Server (KERNEL) Version: < 7.21
Version: < 7.45
Version: < 7.49
Version: < 7.53
Version: < 7.73
Version: < 7.74
Version: < 7.75
Version: < 8.04
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:44:16.340Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "107377",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/107377"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=515408080"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://launchpad.support.sap.com/#/notes/2727689"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ABAP Platform \u0026 Server (KRNL32NUC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            }
          ]
        },
        {
          "product": "ABAP Platform \u0026 Server (KRNL32UC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            }
          ]
        },
        {
          "product": "ABAP Platform \u0026 Server (KRNL64NUC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.49"
            },
            {
              "status": "affected",
              "version": "\u003c 7.74"
            }
          ]
        },
        {
          "product": "ABAP Platform \u0026 Server (KRNL64UC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.49"
            },
            {
              "status": "affected",
              "version": "\u003c 7.73"
            },
            {
              "status": "affected",
              "version": "\u003c 7.74"
            },
            {
              "status": "affected",
              "version": "\u003c 8.04"
            }
          ]
        },
        {
          "product": "ABAP Platform \u0026 Server (KERNEL)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.45"
            },
            {
              "status": "affected",
              "version": "\u003c 7.49"
            },
            {
              "status": "affected",
              "version": "\u003c 7.53"
            },
            {
              "status": "affected",
              "version": "\u003c 7.73"
            },
            {
              "status": "affected",
              "version": "\u003c 7.74"
            },
            {
              "status": "affected",
              "version": "\u003c 7.75"
            },
            {
              "status": "affected",
              "version": "\u003c 8.04"
            }
          ]
        }
      ],
      "datePublic": "2019-03-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ABAP Server of SAP NetWeaver and ABAP Platform fail to perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has been corrected in the following versions: KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.74, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, 7.74, 8.04, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, 7.74, 7.75, 8.04."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Missing Authorization Check",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-03-14T09:57:01",
        "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
        "shortName": "sap"
      },
      "references": [
        {
          "name": "107377",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/107377"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=515408080"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://launchpad.support.sap.com/#/notes/2727689"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cna@sap.com",
          "ID": "CVE-2019-0270",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ABAP Platform \u0026 Server (KRNL32NUC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ABAP Platform \u0026 Server (KRNL32UC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ABAP Platform \u0026 Server (KRNL64NUC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.49"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.74"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ABAP Platform \u0026 Server (KRNL64UC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.49"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.73"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.74"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "8.04"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ABAP Platform \u0026 Server (KERNEL)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.45"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.49"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.53"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.73"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.74"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.75"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "8.04"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "SAP SE"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ABAP Server of SAP NetWeaver and ABAP Platform fail to perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This has been corrected in the following versions: KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.74, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, 7.74, 8.04, KERNEL 7.21, 7.45, 7.49, 7.53, 7.73, 7.74, 7.75, 8.04."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Missing Authorization Check"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "107377",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/107377"
            },
            {
              "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=515408080",
              "refsource": "MISC",
              "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=515408080"
            },
            {
              "name": "https://launchpad.support.sap.com/#/notes/2727689",
              "refsource": "MISC",
              "url": "https://launchpad.support.sap.com/#/notes/2727689"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
    "assignerShortName": "sap",
    "cveId": "CVE-2019-0270",
    "datePublished": "2019-03-12T22:00:00",
    "dateReserved": "2018-11-26T00:00:00",
    "dateUpdated": "2024-08-04T17:44:16.340Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-0265
Vulnerability from cvelistv5
Published
2019-02-15 18:00
Modified
2024-08-04 17:44
Severity ?
Summary
SLD Registration of ABAP Platform allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. Fixed in versions KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT,KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49,KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49. 7.73 KERNEL from 7.21 to 7.22, 7.45, 7.49, 7.53, 7.73, 7.75.
Impacted products
Vendor Product Version
SAP SE ABAP Platform (KRNL32NUC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Create a notification for this product.
   SAP SE ABAP Platform (KRNL32UC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Create a notification for this product.
   SAP SE ABAP Platform (KRNL64NUC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Version: < 7.49
Create a notification for this product.
   SAP SE ABAP Platform (KRNL64UC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Version: < 7.49
Version: < 7.73
Create a notification for this product.
   SAP SE ABAP Platform (KERNEL) Version: < from 7.21 to 7.22
Version: < 7.45
Version: < 7.49
Version: < 7.53
Version: < 7.73
Version: < 7.75
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:44:16.194Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
          },
          {
            "name": "106972",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/106972"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://launchpad.support.sap.com/#/notes/2729710"
          },
          {
            "name": "107364",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/107364"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ABAP Platform (KRNL32NUC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            }
          ]
        },
        {
          "product": "ABAP Platform (KRNL32UC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            }
          ]
        },
        {
          "product": "ABAP Platform (KRNL64NUC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.49"
            }
          ]
        },
        {
          "product": "ABAP Platform (KRNL64UC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.49"
            },
            {
              "status": "affected",
              "version": "\u003c 7.73"
            }
          ]
        },
        {
          "product": "ABAP Platform (KERNEL)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c from 7.21 to 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.45"
            },
            {
              "status": "affected",
              "version": "\u003c 7.49"
            },
            {
              "status": "affected",
              "version": "\u003c 7.53"
            },
            {
              "status": "affected",
              "version": "\u003c 7.73"
            },
            {
              "status": "affected",
              "version": "\u003c 7.75"
            }
          ]
        }
      ],
      "datePublic": "2019-02-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SLD Registration of ABAP Platform allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. Fixed in versions KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT,KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49,KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49. 7.73 KERNEL from 7.21 to 7.22, 7.45, 7.49, 7.53, 7.73, 7.75."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-03-13T09:57:01",
        "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
        "shortName": "sap"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
        },
        {
          "name": "106972",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/106972"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://launchpad.support.sap.com/#/notes/2729710"
        },
        {
          "name": "107364",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/107364"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cna@sap.com",
          "ID": "CVE-2019-0265",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "ABAP Platform (KRNL32NUC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ABAP Platform (KRNL32UC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ABAP Platform (KRNL64NUC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.49"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ABAP Platform (KRNL64UC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.49"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.73"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "ABAP Platform (KERNEL)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "from 7.21 to 7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.45"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.49"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.53"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.73"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.75"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "SAP SE"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SLD Registration of ABAP Platform allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. Fixed in versions KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT,KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49,KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49. 7.73 KERNEL from 7.21 to 7.22, 7.45, 7.49, 7.53, 7.73, 7.75."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943",
              "refsource": "MISC",
              "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943"
            },
            {
              "name": "106972",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/106972"
            },
            {
              "name": "https://launchpad.support.sap.com/#/notes/2729710",
              "refsource": "MISC",
              "url": "https://launchpad.support.sap.com/#/notes/2729710"
            },
            {
              "name": "107364",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/107364"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
    "assignerShortName": "sap",
    "cveId": "CVE-2019-0265",
    "datePublished": "2019-02-15T18:00:00",
    "dateReserved": "2018-11-26T00:00:00",
    "dateUpdated": "2024-08-04T17:44:16.194Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-0349
Vulnerability from cvelistv5
Published
2019-08-14 14:54
Modified
2024-08-04 17:44
Severity ?
Summary
SAP Kernel (ABAP Debugger), versions KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.49, 7.53, 7.73, 7.75, 7.76, 7.77, allows a user to execute “Go to statement” without possessing the authorization S_DEVELOP DEBUG 02, resulting in Missing Authorization Check
Impacted products
Vendor Product Version
SAP SE SAP Kernel (KRNL32NUC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Create a notification for this product.
   SAP SE SAP Kernel (KRNL32UC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Create a notification for this product.
   SAP SE SAP Kernel (KRNL64NUC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Version: < 7.49
Create a notification for this product.
   SAP SE SAP Kernel (KRNL64UC) Version: < 7.21
Version: < 7.21EXT
Version: < 7.22
Version: < 7.22EXT
Version: < 7.49
Version: < 7.73
Create a notification for this product.
   SAP SE SAP Kernel (KERNEL) Version: < 7.21
Version: < 7.49
Version: < 7.53
Version: < 7.73
Version: < 7.75
Version: < 7.76
Version: < 7.77
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:44:16.482Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://launchpad.support.sap.com/#/notes/2798743"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SAP Kernel (KRNL32NUC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            }
          ]
        },
        {
          "product": "SAP Kernel (KRNL32UC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            }
          ]
        },
        {
          "product": "SAP Kernel (KRNL64NUC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.49"
            }
          ]
        },
        {
          "product": "SAP Kernel (KRNL64UC)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.21EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22"
            },
            {
              "status": "affected",
              "version": "\u003c 7.22EXT"
            },
            {
              "status": "affected",
              "version": "\u003c 7.49"
            },
            {
              "status": "affected",
              "version": "\u003c 7.73"
            }
          ]
        },
        {
          "product": "SAP Kernel (KERNEL)",
          "vendor": "SAP SE",
          "versions": [
            {
              "status": "affected",
              "version": "\u003c 7.21"
            },
            {
              "status": "affected",
              "version": "\u003c 7.49"
            },
            {
              "status": "affected",
              "version": "\u003c 7.53"
            },
            {
              "status": "affected",
              "version": "\u003c 7.73"
            },
            {
              "status": "affected",
              "version": "\u003c 7.75"
            },
            {
              "status": "affected",
              "version": "\u003c 7.76"
            },
            {
              "status": "affected",
              "version": "\u003c 7.77"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SAP Kernel (ABAP Debugger), versions KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.49, 7.53, 7.73, 7.75, 7.76, 7.77, allows a user to execute \u201cGo to statement\u201d without possessing the authorization S_DEVELOP DEBUG 02, resulting in Missing Authorization Check"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Missing Authorization Check",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-08-14T14:54:52",
        "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
        "shortName": "sap"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://launchpad.support.sap.com/#/notes/2798743"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cna@sap.com",
          "ID": "CVE-2019-0349",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SAP Kernel (KRNL32NUC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SAP Kernel (KRNL32UC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SAP Kernel (KRNL64NUC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.49"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SAP Kernel (KRNL64UC)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.22EXT"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.49"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.73"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SAP Kernel (KERNEL)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "\u003c",
                            "version_value": "7.21"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.49"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.53"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.73"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.75"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.76"
                          },
                          {
                            "version_name": "\u003c",
                            "version_value": "7.77"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "SAP SE"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SAP Kernel (ABAP Debugger), versions KRNL32NUC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL32UC 7.21, 7.21EXT, 7.22, 7.22EXT, KRNL64NUC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, KRNL64UC 7.21, 7.21EXT, 7.22, 7.22EXT, 7.49, 7.73, KERNEL 7.21, 7.49, 7.53, 7.73, 7.75, 7.76, 7.77, allows a user to execute \u201cGo to statement\u201d without possessing the authorization S_DEVELOP DEBUG 02, resulting in Missing Authorization Check"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Missing Authorization Check"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017",
              "refsource": "MISC",
              "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523998017"
            },
            {
              "name": "https://launchpad.support.sap.com/#/notes/2798743",
              "refsource": "MISC",
              "url": "https://launchpad.support.sap.com/#/notes/2798743"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
    "assignerShortName": "sap",
    "cveId": "CVE-2019-0349",
    "datePublished": "2019-08-14T14:54:52",
    "dateReserved": "2018-11-26T00:00:00",
    "dateUpdated": "2024-08-04T17:44:16.482Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}