cnvd-2020-65558
Vulnerability from cnvd
Title: SAP NetWeaver AS ABAP信息泄露漏洞(CNVD-2020-65558)
Description:
SAP NetWeaver AS ABAP Business Server是德国思爱普(SAP)公司的一款适用于ABAP(高级商务应用编程)的应用服务器。
SAP NetWeaver Application Server ABAP (POWL test application) 710、711、730、731、740和750版本存在信息泄露漏洞。攻击者可利用该漏洞获取用户账户列表和个人用户信息。
Severity: 低
Patch Name: SAP NetWeaver AS ABAP信息泄露漏洞(CNVD-2020-65558)的补丁
Patch Description:
SAP NetWeaver AS ABAP Business Server是德国思爱普(SAP)公司的一款适用于ABAP(高级商务应用编程)的应用服务器。
SAP NetWeaver Application Server ABAP (POWL test application) 710、711、730、731、740和750版本存在信息泄露漏洞。攻击者可利用该漏洞获取用户账户列表和个人用户信息。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196
Reference: https://vigilance.fr/vulnerability/SAP-multiple-vulnerabilities-of-October-2020-33549
Name | ['SAP SAP NetWeaver AS ABAP 730', 'SAP SAP NetWeaver AS ABAP 731', 'SAP SAP NetWeaver AS ABAP 740', 'SAP SAP NetWeaver AS ABAP 750', 'SAP SAP NetWeaver AS ABAP 710', 'SAP SAP NetWeaver AS ABAP 711'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2020-6371", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2020-6371" } }, "description": "SAP NetWeaver AS ABAP Business Server\u662f\u5fb7\u56fd\u601d\u7231\u666e\uff08SAP\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u9002\u7528\u4e8eABAP\uff08\u9ad8\u7ea7\u5546\u52a1\u5e94\u7528\u7f16\u7a0b\uff09\u7684\u5e94\u7528\u670d\u52a1\u5668\u3002\n\nSAP NetWeaver Application Server ABAP (POWL test application) 710\u3001711\u3001730\u3001731\u3001740\u548c750\u7248\u672c\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u7528\u6237\u8d26\u6237\u5217\u8868\u548c\u4e2a\u4eba\u7528\u6237\u4fe1\u606f\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1ahttps://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2020-65558", "openTime": "2020-11-23", "patchDescription": "SAP NetWeaver AS ABAP Business Server\u662f\u5fb7\u56fd\u601d\u7231\u666e\uff08SAP\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u9002\u7528\u4e8eABAP\uff08\u9ad8\u7ea7\u5546\u52a1\u5e94\u7528\u7f16\u7a0b\uff09\u7684\u5e94\u7528\u670d\u52a1\u5668\u3002\r\n\r\nSAP NetWeaver Application Server ABAP (POWL test application) 710\u3001711\u3001730\u3001731\u3001740\u548c750\u7248\u672c\u5b58\u5728\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u7528\u6237\u8d26\u6237\u5217\u8868\u548c\u4e2a\u4eba\u7528\u6237\u4fe1\u606f\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "SAP NetWeaver AS ABAP\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2020-65558\uff09\u7684\u8865\u4e01", "products": { "product": [ "SAP SAP NetWeaver AS ABAP 730", "SAP SAP NetWeaver AS ABAP 731", "SAP SAP NetWeaver AS ABAP 740", "SAP SAP NetWeaver AS ABAP 750", "SAP SAP NetWeaver AS ABAP 710", "SAP SAP NetWeaver AS ABAP 711" ] }, "referenceLink": "https://vigilance.fr/vulnerability/SAP-multiple-vulnerabilities-of-October-2020-33549", "serverity": "\u4f4e", "submitTime": "2020-10-21", "title": "SAP NetWeaver AS ABAP\u4fe1\u606f\u6cc4\u9732\u6f0f\u6d1e\uff08CNVD-2020-65558\uff09" }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.