{"vulnerability": "CVE-2024-37171", "sightings": [{"uuid": "93da2020-e50c-46e8-bcfd-4e81ab7d13d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-37171", "type": "seen", "source": "https://t.me/cvedetector/249", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-37171 - SAP Transportation Management (Collaboration Porta\", \n  \"Content\": \"CVE ID : CVE-2024-37171 \nPublished : July 9, 2024, 5:15 a.m. | 19\u00a0minutes ago \nDescription : SAP Transportation Management (Collaboration  \nPortal) allows an attacker with non-administrative privileges to send a crafted  \nrequest from a vulnerable web application. This will trigger the application  \nhandler to send a request to an unintended service, which may reveal  \ninformation about that service. The information obtained could be used to  \ntarget internal systems behind firewalls that are normally inaccessible to an  \nattacker from the external network, resulting in a Server-Side Request Forgery  \nvulnerability. There is no effect on integrity or availability of the  \napplication. \nSeverity: 5.0 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-09T07:38:36.000000Z"}]}