CVE-2020-6244
Severity CVSS v4.0:
Pending analysis
Type:
CWE-427
Uncontrolled Search Path Element
Publication date:
12/05/2020
Last modified:
27/05/2025
Description
SAP Business Client, version 7.0, allows an attacker after a successful social engineering attack to inject malicious code as a DLL file in untrusted directories that can be executed by the application, due to uncontrolled search path element. An attacker could thereby control the behavior of the application.
Impact
Base Score 3.x
7.80
Severity 3.x
HIGH
Base Score 2.0
4.40
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:sap:business_client:6.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level1:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level10:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level11:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level12:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level13:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level14:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level15:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level16:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level17:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level2:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level3:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level4:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level5:*:*:*:*:*:* | ||
cpe:2.3:a:sap:business_client:6.0:patch_level6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page