SAP NetWeaver, ABAP Platform and SAP Host Agent - versions KERNEL 7.22, 7.49, 7.53, 7.77, 7.81, 7.85, 7.86, 7.87, 7.88, 8.04, KRNL64NUC 7.22, 7.22EXT, 7.49, KRNL64UC 7.22, 7.22EXT, 7.49, 7.53, 8.04, SAPHOSTAGENT 7.22, allows an authenticated user to misuse a function of sapcontrol webfunctionality(startservice) in Kernel which enables malicious users to retrieve information. On successful exploitation, an attacker can obtain technical information like system number or physical address, which is otherwise restricted, causing a limited impact on the confidentiality of the application.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3194674 | Permissions Required Vendor Advisory |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/3194674 | Permissions Required Vendor Advisory |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/3194674 - Permissions Required, Vendor Advisory | |
References | () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory |
22 Jun 2022, 20:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:sap:netweaver_abap:kernel_7.22:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.49:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:kernel_7.49:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:kernel_8.04:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:kernel_7.77:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:kernel_7.85:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:krnl64uc_8.04:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.22ext:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.22:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:kernel_7.88:*:*:*:*:*:*:* cpe:2.3:a:sap:host_agent:7.22:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.22:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.22ext:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:kernel_7.81:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:kernel_7.53:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.53:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:kernel_7.86:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver_abap:kernel_7.87:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 4.3 |
References | (MISC) https://launchpad.support.sap.com/#/notes/3194674 - Permissions Required, Vendor Advisory | |
References | (MISC) https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory |
14 Jun 2022, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-14 17:15
Updated : 2024-11-21 06:59
NVD link : CVE-2022-29612
Mitre link : CVE-2022-29612
CVE.ORG link : CVE-2022-29612
JSON object : View
Products Affected
sap
- netweaver_abap
- host_agent
CWE
CWE-918
Server-Side Request Forgery (SSRF)