Refine your search
8 vulnerabilities found for NetWeaver Application Server pour ABAP by SAP
CERTFR-2025-AVI-0867
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SAP | SAP NetWeaver AS Java | NetWeaver AS Java version SERVERCORE 7.50 sans le dernier correctif de sécurité | ||
SAP | Financial Service Claims Management | Financial Service Claims Management versions INSURANCE 803, 804, 805, 806, S4CEXT 107, 108 et 109 sans le dernier correctif de sécurité | ||
SAP | Print Service | Print Service versions SAPSPRINT 8.00 et 8.10 sans le dernier correctif de sécurité | ||
SAP | Data Hub Integration Suite | Data Hub Integration Suite version CX_DATAHUB_INT_PACK 2205 sans le dernier correctif de sécurité | ||
SAP | BusinessObjects | BusinessObjects versions ENTERPRISE 430, 2025 et 2027 sans le dernier correctif de sécurité | ||
SAP | NetWeaver Application Server pour ABAP | Application Server pour ABAP versions KRNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, 7.93 et 9.16 sans le dernier correctif de sécurité | ||
SAP | NetWeaver | NetWeaver versions SAP_ABA 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H et 75I sans le dernier correctif de sécurité | ||
SAP | S/4HANA | S/4HANA versions S4CORE 104, 105, 106, 107, 108 et 109 sans le dernier correctif de sécurité | ||
SAP | Cloud Appliance Library Appliances | Cloud Appliance Library Appliances version TITANIUM_WEBAPP 4.0 sans le dernier correctif de sécurité | ||
SAP | Commerce Cloud | Commerce Cloud versions HY_COM 2205, COM_CLOUD 2211 et 2211-JDK21 sans le dernier correctif de sécurité | ||
SAP | NetWeaver Application Server pour ABAP | Application Server pour ABAP versions SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758 et 816 sans le dernier correctif de sécurité | ||
SAP | NetWeaver Application Server ABAP et ABAP Platform | NetWeaver Application Server ABAP and ABAP Platform versions KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.14, 9.15 et 9.16 sans le dernier correctif de sécurité | ||
SAP | Supplier Relationship Management | Supplier Relationship Management versions SRMNXP01 100 et 150 sans le dernier correctif de sécurité | ||
SAP | NetWeaver Application Server ABAP | NetWeaver Application Server ABAP versions RNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, 7.93, 9.12 et 9.14 sans le dernier correctif de sécurité |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "NetWeaver AS Java version SERVERCORE 7.50 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "SAP NetWeaver AS Java", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Financial Service Claims Management versions INSURANCE 803, 804, 805, 806, S4CEXT 107, 108 et 109 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Financial Service Claims Management", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Print Service versions SAPSPRINT 8.00 et 8.10 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Print Service", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Data Hub Integration Suite version CX_DATAHUB_INT_PACK 2205 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Data Hub Integration Suite", "vendor": { "name": "SAP", "scada": false } } }, { "description": "BusinessObjects versions ENTERPRISE 430, 2025 et 2027 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "BusinessObjects", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Application Server pour ABAP versions KRNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, 7.93 et 9.16 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver versions SAP_ABA 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H et 75I sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver", "vendor": { "name": "SAP", "scada": false } } }, { "description": "S/4HANA versions S4CORE 104, 105, 106, 107, 108 et 109 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "S/4HANA", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Cloud Appliance Library Appliances version TITANIUM_WEBAPP 4.0 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Cloud Appliance Library Appliances", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Commerce Cloud versions HY_COM 2205, COM_CLOUD 2211 et 2211-JDK21 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Commerce Cloud", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Application Server pour ABAP versions SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758 et 816 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Application Server ABAP and ABAP Platform versions KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.14, 9.15 et 9.16 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver Application Server ABAP et ABAP Platform", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Supplier Relationship Management versions SRMNXP01 100 et 150 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Supplier Relationship Management", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Application Server ABAP versions RNL64UC 7.53, KERNEL 7.53, 7.54, 7.77, 7.89, 7.93, 9.12 et 9.14 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver Application Server ABAP", "vendor": { "name": "SAP", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-42944", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42944" }, { "name": "CVE-2025-42906", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42906" }, { "name": "CVE-2025-42902", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42902" }, { "name": "CVE-2025-42903", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42903" }, { "name": "CVE-2025-42910", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42910" }, { "name": "CVE-2025-42909", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42909" }, { "name": "CVE-2025-5115", "url": "https://www.cve.org/CVERecord?id=CVE-2025-5115" }, { "name": "CVE-2025-42984", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42984" }, { "name": "CVE-2025-42908", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42908" }, { "name": "CVE-2025-42937", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42937" }, { "name": "CVE-2025-0059", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0059" }, { "name": "CVE-2025-48913", "url": "https://www.cve.org/CVERecord?id=CVE-2025-48913" }, { "name": "CVE-2025-42939", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42939" }, { "name": "CVE-2025-31672", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31672" }, { "name": "CVE-2025-31331", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31331" }, { "name": "CVE-2025-42901", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42901" } ], "initial_release_date": "2025-10-14T00:00:00", "last_revision_date": "2025-10-14T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0867", "revisions": [ { "description": "Version initiale", "revision_date": "2025-10-14T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP", "vendor_advisories": [ { "published_at": "2025-10-14", "title": "Bulletin de s\u00e9curit\u00e9 SAP october-2025", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2025.html" } ] }
CERTFR-2025-AVI-0674
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SAP | Landscape Transformation | Landscape Transformation (Analysis Platform) versions DMIS 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020 | ||
SAP | S/4HANA | S/4HANA (Bank Communication Management) Versions SAP_APPL 606, SAP_FIN 617, 618, 720, 730, S4CORE 102, 103, 104, 105, 106, 107 et 108 | ||
SAP | NetWeaver Application Server pour ABAP | NetWeaver Application Server pour ABAP versions KRNL64UC 7.53, KERNEL versions 7.53, 7.54, 7.77, 7.89 et 7.93 | ||
SAP | Business One (SLD) | Business One (SLD) versions B1_ON_HANA 10.0 et SAP-M-BO 10.0 | ||
SAP | NetWeaver Application Server pour ABAP | NetWeaver ABAP Platform versions S4CRM 100, 200, 204, 205, 206, S4CEXT 107, 108, 109, BBPCRM 713 et 714 | ||
SAP | S/4HANA | S/4HANA avec le composant S4CORE versions 102, 103, 104, 105, 106, 107 et 108 | ||
SAP | Cloud Connector | Cloud Connector version SAP_CLOUD_CONNECTOR 2.0 | ||
SAP | SAP GUI pour Windows | SAP GUI pour Windows version BC-FES-GUI 8.00 | ||
SAP | NetWeaver ABAP Platform | NetWeaver ABAP Platform versions SAP_BASIS 758, SAP_BASIS 816 et SAP_BASIS 916 | ||
SAP | Fiori | Fiori (Launchpad) version SAP_UI 754 | ||
SAP | NetWeaver Application Server pour ABAP | NetWeaver Application Server pour ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 816, SAP_BASIS 914 et SAP_BASIS 916 | ||
SAP | NetWeaver Application Server ABAP et ABAP Platform | NetWeaver Application Server ABAP et ABAP Platform (Internet Communication Manager) versions KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.14, 9.15 et 9.16 | ||
SAP | NetWeaver Application Server pour ABAP | NetWeaver Application Server pour ABAP (BIC Document) versions S4COREOP 104, 105, 106, 107, 108, SEM-BW 600, 602, 603, 604, 605, 634, 736, 746, 747 et 748 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Landscape Transformation (Analysis Platform) versions DMIS 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752, 2020", "product": { "name": "Landscape Transformation", "vendor": { "name": "SAP", "scada": false } } }, { "description": "S/4HANA (Bank Communication Management) Versions SAP_APPL 606, SAP_FIN 617, 618, 720, 730, S4CORE 102, 103, 104, 105, 106, 107 et 108", "product": { "name": "S/4HANA", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Application Server pour ABAP versions KRNL64UC 7.53, KERNEL versions 7.53, 7.54, 7.77, 7.89 et 7.93", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Business One (SLD) versions B1_ON_HANA 10.0 et SAP-M-BO 10.0", "product": { "name": "Business One (SLD)", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver ABAP Platform versions S4CRM 100, 200, 204, 205, 206, S4CEXT 107, 108, 109, BBPCRM 713 et 714", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "S/4HANA avec le composant S4CORE versions 102, 103, 104, 105, 106, 107 et 108", "product": { "name": "S/4HANA", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Cloud Connector version SAP_CLOUD_CONNECTOR 2.0", "product": { "name": "Cloud Connector", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP GUI pour Windows version BC-FES-GUI 8.00", "product": { "name": "SAP GUI pour Windows", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver ABAP Platform versions SAP_BASIS 758, SAP_BASIS 816 et SAP_BASIS 916", "product": { "name": "NetWeaver ABAP Platform", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Fiori (Launchpad) version SAP_UI 754", "product": { "name": "Fiori", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Application Server pour ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 816, SAP_BASIS 914 et SAP_BASIS 916", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Application Server ABAP et ABAP Platform (Internet Communication Manager) versions KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93, 9.14, 9.15 et 9.16", "product": { "name": "NetWeaver Application Server ABAP et ABAP Platform", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Application Server pour ABAP (BIC Document) versions S4COREOP 104, 105, 106, 107, 108, SEM-BW 600, 602, 603, 604, 605, 634, 736, 746, 747 et 748", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-42943", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42943" }, { "name": "CVE-2025-42975", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42975" }, { "name": "CVE-2025-42945", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42945" }, { "name": "CVE-2025-42950", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42950" }, { "name": "CVE-2025-42936", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42936" }, { "name": "CVE-2025-42949", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42949" }, { "name": "CVE-2025-42946", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42946" }, { "name": "CVE-2025-42934", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42934" }, { "name": "CVE-2025-42955", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42955" }, { "name": "CVE-2025-42935", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42935" }, { "name": "CVE-2025-42948", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42948" }, { "name": "CVE-2025-42976", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42976" }, { "name": "CVE-2025-42957", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42957" }, { "name": "CVE-2025-42951", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42951" }, { "name": "CVE-2025-42941", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42941" }, { "name": "CVE-2025-42942", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42942" } ], "initial_release_date": "2025-08-12T00:00:00", "last_revision_date": "2025-08-12T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0674", "revisions": [ { "description": "Version initiale", "revision_date": "2025-08-12T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP", "vendor_advisories": [ { "published_at": "2025-08-12", "title": "Bulletin de s\u00e9curit\u00e9 SAP august-2025", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/august-2025.html" } ] }
CERTFR-2025-AVI-0487
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une atteinte à l'intégrité des données et une falsification de requêtes côté serveur (SSRF).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SAP | Business Objects Business Intelligence Platform | Business Objects Business Intelligence Platform versions ENTERPRISE 430, 2025 et 2027 | ||
SAP | NetWeaver | NetWeaver (ABAP Keyword Documentation) versions SAP_BASIS 758 | ||
SAP | NetWeaver Visual Composer | NetWeaver Visual Composer versions VCBASE 7.50 | ||
SAP | Business One Integration Framework | Business One Integration Framework versions B1_ON_HANA 10.0 et SAP-M-BO 10.0 | ||
SAP | MDM Server | MDM Server versions 710.750 | ||
SAP | S/4HANA | S/4HANA (Manage Processing Rules - For Bank Statement) versions S4CORE 104, 105, 106, 107 et 108 | ||
SAP | SAPUI5 applications | SAPUI5 applications versions SAP_UI 750, 754, 755, 756, 757, 758 et UI_700 200 | ||
SAP | S/4HANA | S/4HANA (Manage Central Purchase Contract application) versions S4CORE 106, 107 et 108 | ||
SAP | S/4HANA | S/4HANA (Enterprise Event Enablement) versions SAP_GWFND 757 et 758 | ||
SAP | GRC | GRC (AC Plugin) versions GRCPINW V1100_700 et V1100_731 | ||
SAP | BusinessObjects Business Intelligence | BusinessObjects Business Intelligence (BI Workspace) versions ENTERPRISE 430, 2025 et 2027 | ||
SAP | S/4HANA | S/4HANA (Bank Account Application) versions S4CORE 108 | ||
SAP | NetWeaver Application Server pour ABAP | NetWeaver Application Server for ABAP versions KERNEL 7.89, 7.93, 9.14 et 9.15 | ||
SAP | Business Warehouse et SAP Plug-In Basis | Business Warehouse et SAP Plug-In Basis versions PI_BASIS 2006_1_700, 701, 702, 731, 740, SAP_BW 750, 751, 752, 753, 754, 755, 756, 757, 758, 914 et 915 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Business Objects Business Intelligence Platform versions ENTERPRISE 430, 2025 et 2027", "product": { "name": "Business Objects Business Intelligence Platform", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver (ABAP Keyword Documentation) versions SAP_BASIS 758", "product": { "name": "NetWeaver", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Visual Composer versions VCBASE 7.50", "product": { "name": "NetWeaver Visual Composer", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Business One Integration Framework versions B1_ON_HANA 10.0 et SAP-M-BO 10.0", "product": { "name": "Business One Integration Framework", "vendor": { "name": "SAP", "scada": false } } }, { "description": "MDM Server versions 710.750", "product": { "name": "MDM Server", "vendor": { "name": "SAP", "scada": false } } }, { "description": "S/4HANA (Manage Processing Rules - For Bank Statement) versions S4CORE 104, 105, 106, 107 et 108", "product": { "name": "S/4HANA", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAPUI5 applications versions SAP_UI 750, 754, 755, 756, 757, 758 et UI_700 200", "product": { "name": "SAPUI5 applications", "vendor": { "name": "SAP", "scada": false } } }, { "description": "S/4HANA (Manage Central Purchase Contract application) versions S4CORE 106, 107 et 108", "product": { "name": "S/4HANA", "vendor": { "name": "SAP", "scada": false } } }, { "description": "S/4HANA (Enterprise Event Enablement) versions SAP_GWFND 757 et 758", "product": { "name": "S/4HANA", "vendor": { "name": "SAP", "scada": false } } }, { "description": "GRC (AC Plugin) versions GRCPINW V1100_700 et V1100_731", "product": { "name": "GRC", "vendor": { "name": "SAP", "scada": false } } }, { "description": "BusinessObjects Business Intelligence (BI Workspace) versions ENTERPRISE 430, 2025 et 2027", "product": { "name": "BusinessObjects Business Intelligence", "vendor": { "name": "SAP", "scada": false } } }, { "description": "S/4HANA (Bank Account Application) versions S4CORE 108", "product": { "name": "S/4HANA", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Application Server for ABAP versions KERNEL 7.89, 7.93, 9.14 et 9.15", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Business Warehouse et SAP Plug-In Basis versions PI_BASIS 2006_1_700, 701, 702, 731, 740, SAP_BW 750, 751, 752, 753, 754, 755, 756, 757, 758, 914 et 915", "product": { "name": "Business Warehouse et SAP Plug-In Basis", "vendor": { "name": "SAP", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-42987", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42987" }, { "name": "CVE-2025-42991", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42991" }, { "name": "CVE-2025-42996", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42996" }, { "name": "CVE-2025-42988", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42988" }, { "name": "CVE-2025-42995", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42995" }, { "name": "CVE-2025-42984", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42984" }, { "name": "CVE-2025-42982", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42982" }, { "name": "CVE-2025-42993", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42993" }, { "name": "CVE-2025-42977", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42977" }, { "name": "CVE-2025-31325", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31325" }, { "name": "CVE-2025-42983", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42983" }, { "name": "CVE-2025-42998", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42998" }, { "name": "CVE-2025-42989", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42989" }, { "name": "CVE-2025-42994", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42994" }, { "name": "CVE-2025-23192", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23192" }, { "name": "CVE-2025-42990", "url": "https://www.cve.org/CVERecord?id=CVE-2025-42990" } ], "initial_release_date": "2025-06-11T00:00:00", "last_revision_date": "2025-06-11T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0487", "revisions": [ { "description": "Version initiale", "revision_date": "2025-06-11T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF).", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP", "vendor_advisories": [ { "published_at": "2025-06-10", "title": "Bulletin de s\u00e9curit\u00e9 SAP june-2025", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/june-2025.html" } ] }
CERTFR-2025-AVI-0285
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
L'éditeur indique que la vulnérabilité CVE-2025-31324 est activement exploitée.
Vendor | Product | Description | ||
---|---|---|---|---|
SAP | S/4HANA (Private Cloud) | S/4HANA (Learning Solution) versions S4HCMGXX 100 et 101 sans le dernier correctif de sécurité | ||
SAP | NetWeaver Application Server pour ABAP | NetWeaver Application Server ABAP (applications based on GUI for HTML) versions KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93 et 9.14 sans le dernier correctif de sécurité | ||
SAP | SAP BusinessObjects Business Intelligence | BusinessObjects Business Intelligence platform (Central Management Console) versions ENTERPRISE 430 et 2025 sans le dernier correctif de sécurité | ||
SAP | NetWeaver Application Server pour ABAP | NetWeaver Application Server ABAP (Virus Scan Interface) versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757 et SAP_BASIS 758 sans le dernier correctif de sécurité | ||
SAP | NetWeaver et ABAP | NetWeaver et ABAP Platform (Service Data Collection) versions ST-PI 2008_1_700, 2008_1_710 et 740 sans le dernier correctif de sécurité | ||
SAP | NetWeaver Application Server pour ABAP | NetWeaver versions SAP_ABA 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H et 75I sans le dernier correctif de sécurité | ||
SAP | S4CORE entity | S4CORE entity versions S4CORE 107 et 108 sans le dernier correctif de sécurité | ||
SAP | Commerce Cloud | Commerce Cloud versions HY_COM 2205 et COM_CLOUD 2211 sans le dernier correctif de sécurité | ||
SAP | ERP BW Business Content | ERP BW Business Content versions BI_CONT 707, 737, 747 et 757 sans le dernier correctif de sécurité | ||
SAP | Commerce Cloud | Commerce Cloud (Public Cloud) version COM_CLOUD 2211 sans le dernier correctif de sécurité | ||
SAP | N/A | Field Logistics versions S4CORE 107 et 108 sans le dernier correctif | ||
SAP | NetWeaver Application Server pour ABAP | NetWeaver Application Server ABAP versions KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89 et 7.93 sans le dernier correctif de sécurité | ||
SAP | NetWeaver et ABAP | NetWeaver (Visual Composer development server) versions VCFRAMEWORK 7.50 sans le dernier correctif de sécurité | ||
SAP | NetWeaver et ABAP | NetWeaver et ABAP Platform (Application Server ABAP) versions KRNL64UC 7.53, KERNEL 7.53 et 7.54 sans le dernier correctif de sécurité | ||
SAP | Solution Manager | Solution Manager versions ST 720, SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 914 sans le dernier correctif de sécurité | ||
SAP | Capital Yield Tax Management | Capital Yield Tax Management versions CYTERP 420_700, CYT 800, IBS 7.0 et CYT4HANA 100 sans le dernier correctif de sécurité | ||
SAP | SAP BusinessObjects Business Intelligence | BusinessObjects Business Intelligence Platform version ENTERPRISE 430 sans le dernier correctif de sécurité | ||
SAP | S/4HANA (Private Cloud) | S/4HANA (Private Cloud) versions S4CORE 102, 103, 104, 105, 106, 107 et 108 sans le dernier correctif de sécurité | ||
SAP | CRM | CRM et S/4HANA (Interaction Center) versions S4CRM 100, 200, 204, 205, 206, S4FND 102, 103, 104, 105, 106, 107, 108, S4CEXT 107, 108, BBPCRM 701, 702, 712, 713, 714, WEBCUIF 701, 731, 746, 747, 748, 800 et 801 sans le dernier correctif de sécurité | ||
SAP | KMC WPC | KMC WPC version KMC-WPC 7.50 sans le dernier correctif de sécurité | ||
SAP | Landscape Transformation | Landscape Transformation (Analysis Platform) versions DMIS 2011_1_700, 2011_1_710, 2011_1_730 et 2011_1_731 sans le dernier correctif de sécurité |
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "S/4HANA (Learning Solution) versions S4HCMGXX 100 et 101 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "S/4HANA (Private Cloud)", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Application Server ABAP (applications based on GUI for HTML) versions KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89, 7.93 et 9.14 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "BusinessObjects Business Intelligence platform (Central Management Console) versions ENTERPRISE 430 et 2025 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "SAP BusinessObjects Business Intelligence", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Application Server ABAP (Virus Scan Interface) versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757 et SAP_BASIS 758 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver et ABAP Platform (Service Data Collection) versions ST-PI 2008_1_700, 2008_1_710 et 740 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver et ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver versions SAP_ABA 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H et 75I sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "S4CORE entity versions S4CORE 107 et 108 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "S4CORE entity", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Commerce Cloud versions HY_COM 2205 et COM_CLOUD 2211 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Commerce Cloud", "vendor": { "name": "SAP", "scada": false } } }, { "description": "ERP BW Business Content versions BI_CONT 707, 737, 747 et 757 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "ERP BW Business Content", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Commerce Cloud (Public Cloud) version COM_CLOUD 2211 sans le dernier correctif de s\u00e9curit\u00e9\n", "product": { "name": "Commerce Cloud", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Field Logistics versions S4CORE 107 et 108 sans le dernier correctif", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Application Server ABAP versions KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, KERNEL 7.22, 7.53, 7.54, 7.77, 7.89 et 7.93 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver (Visual Composer development server) versions VCFRAMEWORK 7.50 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver et ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver et ABAP Platform (Application Server ABAP) versions KRNL64UC 7.53, KERNEL 7.53 et 7.54 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver et ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Solution Manager versions ST 720, SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 914 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Solution Manager", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Capital Yield Tax Management versions CYTERP 420_700, CYT 800, IBS 7.0 et CYT4HANA 100 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Capital Yield Tax Management", "vendor": { "name": "SAP", "scada": false } } }, { "description": "BusinessObjects Business Intelligence Platform version ENTERPRISE 430 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "SAP BusinessObjects Business Intelligence", "vendor": { "name": "SAP", "scada": false } } }, { "description": "S/4HANA (Private Cloud) versions S4CORE 102, 103, 104, 105, 106, 107 et 108 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "S/4HANA (Private Cloud)", "vendor": { "name": "SAP", "scada": false } } }, { "description": "CRM et S/4HANA (Interaction Center) versions S4CRM 100, 200, 204, 205, 206, S4FND 102, 103, 104, 105, 106, 107, 108, S4CEXT 107, 108, BBPCRM 701, 702, 712, 713, 714, WEBCUIF 701, 731, 746, 747, 748, 800 et 801 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "CRM", "vendor": { "name": "SAP", "scada": false } } }, { "description": "KMC WPC version KMC-WPC 7.50 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "KMC WPC", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Landscape Transformation (Analysis Platform) versions DMIS 2011_1_700, 2011_1_710, 2011_1_730 et 2011_1_731 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Landscape Transformation", "vendor": { "name": "SAP", "scada": false } } } ], "affected_systems_content": "L\u0027\u00e9diteur indique que la vuln\u00e9rabilit\u00e9 CVE-2025-31324 est activement exploit\u00e9e.", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-30015", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30015" }, { "name": "CVE-2025-31333", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31333" }, { "name": "CVE-2025-27429", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27429" }, { "name": "CVE-2025-27428", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27428" }, { "name": "CVE-2025-0064", "url": "https://www.cve.org/CVERecord?id=CVE-2025-0064" }, { "name": "CVE-2025-23186", "url": "https://www.cve.org/CVERecord?id=CVE-2025-23186" }, { "name": "CVE-2025-27435", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27435" }, { "name": "CVE-2025-26654", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26654" }, { "name": "CVE-2025-26653", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26653" }, { "name": "CVE-2025-31324", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31324" }, { "name": "CVE-2025-30014", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30014" }, { "name": "CVE-2024-56337", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56337" }, { "name": "CVE-2025-27437", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27437" }, { "name": "CVE-2025-30016", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30016" }, { "name": "CVE-2025-31332", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31332" }, { "name": "CVE-2025-26657", "url": "https://www.cve.org/CVERecord?id=CVE-2025-26657" }, { "name": "CVE-2025-31328", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31328" }, { "name": "CVE-2025-30013", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30013" }, { "name": "CVE-2025-30017", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30017" }, { "name": "CVE-2025-27430", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27430" }, { "name": "CVE-2025-31331", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31331" }, { "name": "CVE-2025-31330", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31330" }, { "name": "CVE-2025-31327", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31327" } ], "initial_release_date": "2025-04-08T00:00:00", "last_revision_date": "2025-04-25T00:00:00", "links": [ { "title": "FAQ sur l\u0027exploitation de la vuln\u00e9rabilit\u00e9 CVE-2025-31324", "url": "https://me.sap.com/notes/3596125" } ], "reference": "CERTFR-2025-AVI-0285", "revisions": [ { "description": "Version initiale", "revision_date": "2025-04-08T00:00:00.000000" }, { "description": "Ajout des vuln\u00e9rabilit\u00e9s CVE-2025-31324, CVE-2025-31328 et CVE-2025-31327", "revision_date": "2025-04-25T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP", "vendor_advisories": [ { "published_at": "2025-04-08", "title": "Bulletin de s\u00e9curit\u00e9 SAP april-2025", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/april-2025.html" } ] }
CERTFR-2024-AVI-0754
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une injection de code indirecte à distance (XSS) et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
SAP | SAP pour Oil & Gas | SAP pour Oil & Gas versions 600, 602, 603, 604, 605, 606, 617, 618, 800, 802, 803, 804, 805, 806, 807 et 807 sans le dernier correctif de sécurité | ||
SAP | Commerce Cloud | Commerce Cloud versions HY_COM 1808, 1811, 1905, 2005, 2105, 2011, 2205 et COM_CLOUD 2211 sans le dernier correctif de sécurité | ||
SAP | Business Warehouse | Business Warehouse (BEx Analyzer) versions DW4CORE 200, DW4CORE 300, DW4CORE 400, SAP_BW 700, SAP_BW 701, SAP_BW 702, SAP_BW 731, SAP_BW 740, SAP_BW 750, SAP_BW 751, SAP_BW 752, SAP_BW 753, SAP_BW 754, SAP_BW 755, SAP_BW 756, SAP_BW 757 et SAP_BW 758 sans le dernier correctif de sécurité | ||
SAP | S/4HANA (Manage Incoming Payment Files) | S/4 HANA version 900 sans le dernier correctif de sécurité | ||
SAP | NetWeaver BW | NetWeaver BW (BEx Analyzer) versions DW4CORE 200, DW4CORE 300, DW4CORE 400, SAP_BW 700, SAP_BW 701, SAP_BW 702, SAP_BW 731, SAP_BW 740, SAP_BW 750, SAP_BW 751, SAP_BW 752, SAP_BW 753, SAP_BW 754, SAP_BW 755, SAP_BW 756, SAP_BW 757 et SAP_BW 758 sans le dernier correctif de sécurité | ||
SAP | SAP NetWeaver AS Java | NetWeaver AS pour Java (Destination Service et Logon Application) version 7.50 sans le dernier correctif de sécurité | ||
SAP | SAP BusinessObjects Business Intelligence | BusinessObjects Business Intelligence Platform version 430 sans le dernier correctif de sécurité | ||
SAP | SAP Student Life Cycle Management | Student Life Cycle Management (SLcM) versions 617, 618, 800, 802, 803, 804, 805, 806, 807 et 808 sans le dernier correctif de sécurité | ||
SAP | SAP BusinessObjects Business Intelligence | BusinessObjects Business Intelligence Platform versions ENTERPRISE 430 et 440 sans le dernier correctif de sécurité | ||
SAP | Replication Server | Replication Server versions 16.0.3 et 16.0.4 sans le dernier correctif de sécurité | ||
SAP | NetWeaver Application Server ABAP et ABAP Platform | SAP NetWeaver Application Server pour ABAP et ABAP Platform, Versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 912 sans le dernier correctif de sécurité | ||
SAP | Production et Revenue Accounting | Production et Revenue Accounting (Tobin interface) versions S4CEXT 106, S4CEXT 107, S4CEXT 108, IS-PRA 605, IS-PRA 606, IS-PRA 616, IS-PRA 617, IS-PRA 618, IS-PRA 800, IS-PRA 801, IS-PRA 802, IS-PRA 803, IS-PRA 804 et IS-PRA 805 sans le dernier correctif de sécurité | ||
SAP | NetWeaver Enterprise Portal | NetWeaver Enterprise Portal version 7.50 sans le dernier correctif de sécurité | ||
SAP | NetWeaver Application Server pour ABAP | NetWeaver Application Server pour ABAP (CRM Blueprint Application Builder Panel) versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H et 75I sans le dernier correctif de sécurité | ||
SAP | S/4HANA eProcurement | S/4HANA eProcurement versions SAP_APPL 606, SAP_APPL 617, SAP_APPL 618, S4CORE 102, S4CORE 103, S4CORE 104, S4CORE 105, S4CORE 106, S4CORE 107 et S4CORE 108 sans le dernier correctif de sécurité |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SAP pour Oil \u0026 Gas versions 600, 602, 603, 604, 605, 606, 617, 618, 800, 802, 803, 804, 805, 806, 807 et 807 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "SAP pour Oil \u0026 Gas", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Commerce Cloud versions HY_COM 1808, 1811, 1905, 2005, 2105, 2011, 2205 et COM_CLOUD 2211 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Commerce Cloud", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Business Warehouse (BEx Analyzer) versions DW4CORE 200, DW4CORE 300, DW4CORE 400, SAP_BW 700, SAP_BW 701, SAP_BW 702, SAP_BW 731, SAP_BW 740, SAP_BW 750, SAP_BW 751, SAP_BW 752, SAP_BW 753, SAP_BW 754, SAP_BW 755, SAP_BW 756, SAP_BW 757 et SAP_BW 758 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Business Warehouse", "vendor": { "name": "SAP", "scada": false } } }, { "description": "S/4 HANA version 900 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "S/4HANA (Manage Incoming Payment Files)", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver BW (BEx Analyzer) versions DW4CORE 200, DW4CORE 300, DW4CORE 400, SAP_BW 700, SAP_BW 701, SAP_BW 702, SAP_BW 731, SAP_BW 740, SAP_BW 750, SAP_BW 751, SAP_BW 752, SAP_BW 753, SAP_BW 754, SAP_BW 755, SAP_BW 756, SAP_BW 757 et SAP_BW 758 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver BW", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver AS pour Java (Destination Service et Logon Application) version 7.50 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "SAP NetWeaver AS Java", "vendor": { "name": "SAP", "scada": false } } }, { "description": "BusinessObjects Business Intelligence Platform version 430 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "SAP BusinessObjects Business Intelligence", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Student Life Cycle Management (SLcM) versions 617, 618, 800, 802, 803, 804, 805, 806, 807 et 808 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "SAP Student Life Cycle Management", "vendor": { "name": "SAP", "scada": false } } }, { "description": "BusinessObjects Business Intelligence Platform versions ENTERPRISE 430 et 440 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "SAP BusinessObjects Business Intelligence", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Replication Server versions 16.0.3 et 16.0.4 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Replication Server", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver Application Server pour ABAP et ABAP Platform, Versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 912 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver Application Server ABAP et ABAP Platform", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Production et Revenue Accounting (Tobin interface) versions S4CEXT 106, S4CEXT 107, S4CEXT 108, IS-PRA 605, IS-PRA 606, IS-PRA 616, IS-PRA 617, IS-PRA 618, IS-PRA 800, IS-PRA 801, IS-PRA 802, IS-PRA 803, IS-PRA 804 et IS-PRA 805 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "Production et Revenue Accounting", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Enterprise Portal version 7.50 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver Enterprise Portal", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Application Server pour ABAP (CRM Blueprint Application Builder Panel) versions 700, 701, 702, 731, 740, 750, 751, 752, 75C, 75D, 75E, 75F, 75G, 75H et 75I sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "S/4HANA eProcurement versions SAP_APPL 606, SAP_APPL 617, SAP_APPL 618, S4CORE 102, S4CORE 103, S4CORE 104, S4CORE 105, S4CORE 106, S4CORE 107 et S4CORE 108 sans le dernier correctif de s\u00e9curit\u00e9", "product": { "name": "S/4HANA eProcurement", "vendor": { "name": "SAP", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-45281", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45281" }, { "name": "CVE-2024-44115", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44115" }, { "name": "CVE-2024-45279", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45279" }, { "name": "CVE-2024-44117", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44117" }, { "name": "CVE-2024-33003", "url": "https://www.cve.org/CVERecord?id=CVE-2024-33003" }, { "name": "CVE-2023-0215", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0215" }, { "name": "CVE-2023-0286", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0286" }, { "name": "CVE-2024-45285", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45285" }, { "name": "CVE-2024-45286", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45286" }, { "name": "CVE-2024-44116", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44116" }, { "name": "CVE-2024-44113", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44113" }, { "name": "CVE-2024-41729", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41729" }, { "name": "CVE-2024-44112", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44112" }, { "name": "CVE-2024-41728", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41728" }, { "name": "CVE-2024-42371", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42371" }, { "name": "CVE-2024-42380", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42380" }, { "name": "CVE-2024-45280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45280" }, { "name": "CVE-2024-45283", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45283" }, { "name": "CVE-2013-3587", "url": "https://www.cve.org/CVERecord?id=CVE-2013-3587" }, { "name": "CVE-2022-0778", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0778" }, { "name": "CVE-2024-45284", "url": "https://www.cve.org/CVERecord?id=CVE-2024-45284" }, { "name": "CVE-2024-44114", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44114" }, { "name": "CVE-2024-41730", "url": "https://www.cve.org/CVERecord?id=CVE-2024-41730" }, { "name": "CVE-2024-44121", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44121" }, { "name": "CVE-2024-42378", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42378" }, { "name": "CVE-2024-44120", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44120" } ], "initial_release_date": "2024-09-10T00:00:00", "last_revision_date": "2024-09-10T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0754", "revisions": [ { "description": "Version initiale", "revision_date": "2024-09-10T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une injection de code indirecte \u00e0 distance (XSS) et un contournement de la politique de s\u00e9curit\u00e9.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP", "vendor_advisories": [ { "published_at": "2024-09-09", "title": "Bulletin de s\u00e9curit\u00e9 SAP", "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/september-2024.html" } ] }
CERTFR-2023-AVI-0228
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
SAP | N/A | Authenticator pour Android version 1.3.0 | ||
SAP | N/A | Business Objects Business Intelligence Platform (CMC) versions 420et 430 | ||
SAP | N/A | NetWeaver AS pour ABAP et ABAP Platform (SAPRSBRO Program) versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756 et 757 | ||
SAP | N/A | ABAP Platform versions 751, 753, 753, 754, 756, 757 et 791 | ||
SAP | N/A | Solution Manager et ABAP managed systems(ST-PI) versions 2008_1_700, 2008_1_710 et 740 | ||
SAP | N/A | NetWeaver versions 700, 701, 702, 731, 740 et 750 | ||
SAP | N/A | NetWeaver AS pour ABAP et ABAP Platform versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757 et 791 | ||
SAP | N/A | NetWeaver AS pour ABAP et ABAP Platform versions SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757 et 791 | ||
SAP | N/A | BusinessObjects Business Intelligence Platform (Web Services) versions 420 et 430 | ||
SAP | N/A | NetWeaver(SAP Enterprise Portal) versions 7.50 | ||
SAP | N/A | NetWeaver AS Java (Object Analyzing Service) version 7.50 | ||
SAP | NetWeaver Application Server pour ABAP | NetWeaver Application Server pour ABAP et ABAP Platform versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757 et 791 | ||
SAP | N/A | Content Server version 7.53 | ||
SAP | N/A | Business Objects (Adaptive Job Server) versions 420 et 430 | ||
SAP | N/A | NetWeaver AS pour Java version 7.50 | ||
SAP | N/A | Host Agent version 7.22 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Authenticator pour Android version 1.3.0", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Business Objects Business Intelligence Platform (CMC) versions 420et 430", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver AS pour ABAP et ABAP Platform (SAPRSBRO Program) versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756 et 757", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "ABAP Platform versions 751, 753, 753, 754, 756, 757 et 791", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Solution Manager et ABAP managed systems(ST-PI) versions 2008_1_700, 2008_1_710 et 740", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver versions 700, 701, 702, 731, 740 et 750", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver AS pour ABAP et ABAP Platform versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757 et 791", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver AS pour ABAP et ABAP Platform versions SAP_BASIS 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757 et 791", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "BusinessObjects Business Intelligence Platform (Web Services) versions 420 et 430", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver(SAP Enterprise Portal) versions 7.50", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver AS Java (Object Analyzing Service) version 7.50", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver Application Server pour ABAP et ABAP Platform versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757 et 791", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Content Server version 7.53", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Business Objects (Adaptive Job Server) versions 420 et 430", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "NetWeaver AS pour Java version 7.50", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "Host Agent version 7.22", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2023-26459", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26459" }, { "name": "CVE-2023-27498", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27498" }, { "name": "CVE-2023-25616", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25616" }, { "name": "CVE-2023-27271", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27271" }, { "name": "CVE-2023-27896", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27896" }, { "name": "CVE-2023-25618", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25618" }, { "name": "CVE-2023-27501", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27501" }, { "name": "CVE-2023-26461", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26461" }, { "name": "CVE-2023-26460", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26460" }, { "name": "CVE-2023-23857", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23857" }, { "name": "CVE-2023-27895", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27895" }, { "name": "CVE-2023-0021", "url": "https://www.cve.org/CVERecord?id=CVE-2023-0021" }, { "name": "CVE-2023-27270", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27270" }, { "name": "CVE-2023-25615", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25615" }, { "name": "CVE-2023-27269", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27269" }, { "name": "CVE-2023-27500", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27500" }, { "name": "CVE-2023-27893", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27893" }, { "name": "CVE-2023-26457", "url": "https://www.cve.org/CVERecord?id=CVE-2023-26457" }, { "name": "CVE-2023-25617", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25617" }, { "name": "CVE-2023-27268", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27268" }, { "name": "CVE-2023-27894", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27894" }, { "name": "CVE-2023-24526", "url": "https://www.cve.org/CVERecord?id=CVE-2023-24526" } ], "initial_release_date": "2023-03-15T00:00:00", "last_revision_date": "2023-03-15T00:00:00", "links": [], "reference": "CERTFR-2023-AVI-0228", "revisions": [ { "description": "Version initiale", "revision_date": "2023-03-15T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un contournement de la\npolitique de s\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 SAP du 14 mars 2023", "url": "https://dam.sap.com/mac/app/e/pdf/preview/embed/ucQrx6G?ltr=a\u0026rc=1" } ] }
CERTFR-2022-AVI-345
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
SAP | NetWeaver Application Server pour ABAP | SAP NetWeaver Application Server pour ABAP (Kernel) et ABAP Platform (Kernel) versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, KRNL64UC 8.04, 7.22, 7.22EXT, 7.49, 7.53, KRNL64NUC 7.22, 7.22EXT et 7.49 | ||
SAP | NetWeaver Application Server ABAP et ABAP Platform | SAP NetWeaver Application Server ABAP et ABAP Platform versions 700, 710, 711, 730, 731, 740 et 750-756 | ||
SAP | N/A | SAP Web Dispatcher versions 7.22, 7.49, 7.53, 7.77, 7.81 et 7.83 | ||
SAP | N/A | SAPS/4HANA(Supplier Factsheet et Enterprise Search pour Business Partner, Supplier et Customer) versions 104, 105 et 106 | ||
SAP | N/A | SAP Content Server version 7.53 | ||
SAP | N/A | SAP SQL Anywhere Server version 17.0 | ||
SAP | N/A | SAP Web Dispatcher versions 7.49, 7.53, 7.77, 7.81, 7.85, 7.22EXT, 7.86 et 7.87 | ||
SAP | N/A | SAPUI5, versions 750, 753, 754, 755, 756 et 200 | ||
SAP | N/A | SAP Manufacturing Integration et Intelligence versions 15.1, 15.2, 15.3 et 15.4 | ||
SAP | N/A | SAP Powerdesigner Web Portal version 16.7 | ||
SAP | N/A | SAP Customer Checkout_SVR version 2.0 | ||
SAP | N/A | SAP NetWeaver (Internet Communication Manager versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85 et 7.86 | ||
SAP | N/A | SAP Business Client version 6.5 | ||
SAP | N/A | SAP NetWeaver Application Server pour Java Version 7.50 | ||
SAP | N/A | SAP Customer Checkout version 2.0 | ||
SAP | SAP BusinessObjects Business Intelligence | SAP BusinessObjects Business Intelligence Platform versions 420 et 430 | ||
SAP | N/A | SAP Focused Run (Simple Diagnostics Agent) version 1.0 | ||
SAP | N/A | SAP 3D Visual Enterprise Viewer version 9 | ||
SAP | NetWeaver Enterprise Portal | SAP NetWeaver Enterprise Portal versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40 et 7.50 | ||
SAP | N/A | SAP Fiori Launchpad versions 54, 755 et 756 | ||
SAP | N/A | SAP NetWeaver (EP Web Page Composer) versions 7.20, 7.30, 7.31, 7.40 et 7.50 | ||
SAP | N/A | SAP Web Dispatcher versions 7.53, 7.77, 7.81, 7.85 et 7.86 | ||
SAP | N/A | SAP Commerce versions 905, 2005, 2105 et 2011 | ||
SAP | N/A | SAP Innovation Management version 2 | ||
SAP | N/A | SAP BusinessObjects Enterprise (Central Management Server) versions 420 et 430 | ||
SAP | SAP BusinessObjects Business Intelligence | SAP BusinessObjects Business Intelligence Platform (BI Workspace) version 420 | ||
SAP | NetWeaver et ABAP | SAP NetWeaver et ABAP Platform versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, KRNL64UC 8.04, 7.22, 7.22EXT, 7.49, 7.53, KRNL64NUC 7.22, 7.22EXT et 7.49 | ||
SAP | N/A | SAPUI5 (vbm library) versions 750, 753, 754, 755 et 756 | ||
SAP | N/A | SAP NetWeaver Application Server Java versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49 et 7.53 | ||
SAP | N/A | SAP NetWeaver (Internet Communication Manager) versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85 et 7.86 | ||
SAP | N/A | SAP HANA Extended Application Services version 1 | ||
SAP | N/A | SAP NetWeaver ABAP Server et ABAP Platform versions 740, 750 et 787 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SAP NetWeaver Application Server pour ABAP (Kernel) et ABAP Platform (Kernel) versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, KRNL64UC 8.04, 7.22, 7.22EXT, 7.49, 7.53, KRNL64NUC 7.22, 7.22EXT et 7.49", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver Application Server ABAP et ABAP Platform versions 700, 710, 711, 730, 731, 740 et 750-756", "product": { "name": "NetWeaver Application Server ABAP et ABAP Platform", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Web Dispatcher versions 7.22, 7.49, 7.53, 7.77, 7.81 et 7.83", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAPS/4HANA(Supplier Factsheet et Enterprise Search pour Business Partner, Supplier et Customer) versions 104, 105 et 106", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Content Server version 7.53", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP SQL Anywhere Server version 17.0", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Web Dispatcher versions 7.49, 7.53, 7.77, 7.81, 7.85, 7.22EXT, 7.86 et 7.87", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAPUI5, versions 750, 753, 754, 755, 756 et 200", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Manufacturing Integration et Intelligence versions 15.1, 15.2, 15.3 et 15.4", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Powerdesigner Web Portal version 16.7", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Customer Checkout_SVR version 2.0", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver (Internet Communication Manager versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85 et 7.86", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Business Client version 6.5", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver Application Server pour Java Version 7.50", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Customer Checkout version 2.0", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP BusinessObjects Business Intelligence Platform versions 420 et 430", "product": { "name": "SAP BusinessObjects Business Intelligence", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Focused Run (Simple Diagnostics Agent) version 1.0", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP 3D Visual Enterprise Viewer version 9", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver Enterprise Portal versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40 et 7.50", "product": { "name": "NetWeaver Enterprise Portal", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Fiori Launchpad versions 54, 755 et 756", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver (EP Web Page Composer) versions 7.20, 7.30, 7.31, 7.40 et 7.50", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Web Dispatcher versions 7.53, 7.77, 7.81, 7.85 et 7.86", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Commerce versions 905, 2005, 2105 et 2011", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Innovation Management version 2", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP BusinessObjects Enterprise (Central Management Server) versions 420 et 430", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP BusinessObjects Business Intelligence Platform (BI Workspace) version 420", "product": { "name": "SAP BusinessObjects Business Intelligence", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver et ABAP Platform versions KERNEL 7.22, 8.04, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, KRNL64UC 8.04, 7.22, 7.22EXT, 7.49, 7.53, KRNL64NUC 7.22, 7.22EXT et 7.49", "product": { "name": "NetWeaver et ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAPUI5 (vbm library) versions 750, 753, 754, 755 et 756", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver Application Server Java versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC, 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49 et 7.53", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver (Internet Communication Manager) versions KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85 et 7.86", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP HANA Extended Application Services version 1", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver ABAP Server et ABAP Platform versions 740, 750 et 787", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2022-22965", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22965" }, { "name": "CVE-2022-27654", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27654" }, { "name": "CVE-2022-22545", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22545" }, { "name": "CVE-2022-0613", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0613" }, { "name": "CVE-2022-26106", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26106" }, { "name": "CVE-2022-22543", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22543" }, { "name": "CVE-2022-28772", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28772" }, { "name": "CVE-2022-22536", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22536" }, { "name": "CVE-2022-23181", "url": "https://www.cve.org/CVERecord?id=CVE-2022-23181" }, { "name": "CVE-2022-26107", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26107" }, { "name": "CVE-2022-28214", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28214" }, { "name": "CVE-2022-27667", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27667" }, { "name": "CVE-2022-28216", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28216" }, { "name": "CVE-2022-28217", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28217" }, { "name": "CVE-2022-22541", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22541" }, { "name": "CVE-2022-27657", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27657" }, { "name": "CVE-2022-27671", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27671" }, { "name": "CVE-2022-26105", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26105" }, { "name": "CVE-2022-28770", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28770" }, { "name": "CVE-2022-27658", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27658" }, { "name": "CVE-2022-28773", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28773" }, { "name": "CVE-2022-22532", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22532" }, { "name": "CVE-2022-26101", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26101" }, { "name": "CVE-2021-21480", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21480" }, { "name": "CVE-2022-28213", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28213" }, { "name": "CVE-2022-28215", "url": "https://www.cve.org/CVERecord?id=CVE-2022-28215" }, { "name": "CVE-2022-27655", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27655" }, { "name": "CVE-2022-26109", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26109" }, { "name": "CVE-2022-27670", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27670" }, { "name": "CVE-2021-38162", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38162" }, { "name": "CVE-2020-26291", "url": "https://www.cve.org/CVERecord?id=CVE-2020-26291" }, { "name": "CVE-2022-26108", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26108" }, { "name": "CVE-2021-27516", "url": "https://www.cve.org/CVERecord?id=CVE-2021-27516" }, { "name": "CVE-2021-44832", "url": "https://www.cve.org/CVERecord?id=CVE-2021-44832" }, { "name": "CVE-2022-22533", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22533" }, { "name": "CVE-2021-3647", "url": "https://www.cve.org/CVERecord?id=CVE-2021-3647" }, { "name": "CVE-2022-27669", "url": "https://www.cve.org/CVERecord?id=CVE-2022-27669" }, { "name": "CVE-2022-22542", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22542" } ], "initial_release_date": "2022-04-14T00:00:00", "last_revision_date": "2022-04-14T00:00:00", "links": [], "reference": "CERTFR-2022-AVI-345", "revisions": [ { "description": "Version initiale", "revision_date": "2022-04-14T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" }, { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 SAP du 12 avril 2022", "url": "https://dam.sap.com/mac/app/e/pdf/preview/embed/ucQrx6G?ltr=a\u0026rc=10" } ] }
CERTFR-2021-AVI-770
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneVendor | Product | Description | ||
---|---|---|---|---|
SAP | N/A | SAP SuccessFactors Mobile Application (pour les équipements Android), Versions - <2108 | ||
SAP | N/A | SAP NetWeaver AS ABAP et ABAP Platform, Versions - 740, 750, 751, 752, 753, 754, 755 | ||
SAP | SAP BusinessObjects Business Intelligence | SAP BusinessObjects Business Intelligence Platform (Crystal Reports), Versions - 420, 430 | ||
SAP | N/A | SAP Business Client, Version – 6.5 | ||
SAP | N/A | SAP BusinessObjects Analysis, (édition pour OLAP), Versions - 420, 430 | ||
SAP | N/A | SAP Environmental Compliance, Version - 3.0 | ||
SAP | NetWeaver Application Server pour ABAP | SAP NetWeaver Application Server pour ABAP (SAP Cloud Print Manager et SAPSprint), Versions - 7.70, 7.70 PI, 7.70BYD | ||
SAP | N/A | SAP Business One, Version - 10.0 | ||
SAP | N/A | SAP NetWeaver, Versions - 700, 701, 702, 730 | ||
SAP | N/A | SAP NetWeaver AS ABAP et ABAP Platform, Versions - 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 785 | ||
SAP | N/A | SAPUI5, Versions - 750, 753, 754 | ||
SAP | N/A | SAP NetWeaver AS ABAP et ABAP Platform, Versions - 700, 701, 702, 710, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756 | ||
SAP | N/A | SAP NetWeaver AS ABAP and ABAP Platform, Versions - 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756 |
Title | Publication Time | Tags | |||
---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "SAP SuccessFactors Mobile Application (pour les \u00e9quipements Android), Versions - \u003c2108", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver AS ABAP et ABAP Platform, Versions - 740, 750, 751, 752, 753, 754, 755", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP BusinessObjects Business Intelligence Platform (Crystal Reports), Versions - 420, 430", "product": { "name": "SAP BusinessObjects Business Intelligence", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Business Client, Version \u2013 6.5", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP BusinessObjects Analysis, (\u00e9dition pour OLAP), Versions - 420, 430", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Environmental Compliance, Version - 3.0", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver Application Server pour ABAP (SAP Cloud Print Manager et SAPSprint), Versions - 7.70, 7.70 PI, 7.70BYD", "product": { "name": "NetWeaver Application Server pour ABAP", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP Business One, Version - 10.0", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver, Versions - 700, 701, 702, 730", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver AS ABAP et ABAP Platform, Versions - 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 785", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAPUI5, Versions - 750, 753, 754", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver AS ABAP et ABAP Platform, Versions - 700, 701, 702, 710, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } }, { "description": "SAP NetWeaver AS ABAP and ABAP Platform, Versions - 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756", "product": { "name": "N/A", "vendor": { "name": "SAP", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2021-40498", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40498" }, { "name": "CVE-2021-38180", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38180" }, { "name": "CVE-2020-10683", "url": "https://www.cve.org/CVERecord?id=CVE-2020-10683" }, { "name": "CVE-2021-40500", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40500" }, { "name": "CVE-2021-38179", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38179" }, { "name": "CVE-2021-23926", "url": "https://www.cve.org/CVERecord?id=CVE-2021-23926" }, { "name": "CVE-2021-38183", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38183" }, { "name": "CVE-2021-38181", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38181" }, { "name": "CVE-2021-40496", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40496" }, { "name": "CVE-2021-40497", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40497" }, { "name": "CVE-2021-40495", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40495" }, { "name": "CVE-2021-38178", "url": "https://www.cve.org/CVERecord?id=CVE-2021-38178" }, { "name": "CVE-2021-40499", "url": "https://www.cve.org/CVERecord?id=CVE-2021-40499" }, { "name": "CVE-2020-11023", "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023" } ], "initial_release_date": "2021-10-12T00:00:00", "last_revision_date": "2021-10-12T00:00:00", "links": [], "reference": "CERTFR-2021-AVI-770", "revisions": [ { "description": "Version initiale", "revision_date": "2021-10-12T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni\nde service, un contournement de la politique de s\u00e9curit\u00e9 et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 SAP 587169983 du 12 octobre 2021", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=587169983" } ] }