CVE-2024-42374
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/08/2024
Last modified:
16/09/2024
Description
BEx Web Java Runtime Export Web Service does not<br />
sufficiently validate an XML document accepted from an untrusted source. An<br />
attacker can retrieve information from the SAP ADS system and exhaust the<br />
number of XMLForm service which makes the SAP ADS rendering (PDF creation)<br />
unavailable. This affects the confidentiality and availability of the<br />
application.
Impact
Base Score 3.x
8.20
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sap:bex_web_java_runtime_export_web_service:bi-base-b_7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:bex_web_java_runtime_export_web_service:bi-base-e_7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:bex_web_java_runtime_export_web_service:bi-base-s_7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:bex_web_java_runtime_export_web_service:bi-ibc_7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:bex_web_java_runtime_export_web_service:biwebapp_7.5:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



