The SAP Gateway, versions 7.5, 7.51, 7.52 and 7.53, allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it's not.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html | Exploit Third Party Advisory |
http://www.securityfocus.com/bid/109074 | Third Party Advisory VDB Entry |
https://cxsecurity.com/ascii/WLB-2019050283 | Third Party Advisory |
https://drive.google.com/open?id=1aGFqggvydehSK7MFIsfKW7tO60yiF55f | Exploit Third Party Advisory |
https://launchpad.support.sap.com/#/notes/2752614 | Permissions Required Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2911267 | |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2019-07-10 19:15
Updated : 2024-02-04 20:20
NVD link : CVE-2019-0319
Mitre link : CVE-2019-0319
CVE.ORG link : CVE-2019-0319
JSON object : View
Products Affected
sap
- ui5
- gateway