CVE-2020-6244

Severity CVSS v4.0:
Pending analysis
Type:
CWE-427 Uncontrolled Search Path Element
Publication date:
12/05/2020
Last modified:
27/05/2025

Description

SAP Business Client, version 7.0, allows an attacker after a successful social engineering attack to inject malicious code as a DLL file in untrusted directories that can be executed by the application, due to uncontrolled search path element. An attacker could thereby control the behavior of the application.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:sap:business_client:6.0:-:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level1:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level10:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level11:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level12:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level13:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level14:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level15:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level16:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level17:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level2:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level3:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level4:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level5:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level6:*:*:*:*:*:*