CVE-2019-0319
Severity CVSS v4.0:
Pending analysis
Type:
CWE-74
Injection
Publication date:
10/07/2019
Last modified:
24/08/2020
Description
The SAP Gateway, versions 7.5, 7.51, 7.52 and 7.53, allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it's not.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sap:gateway:7.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:gateway:7.51:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:gateway:7.52:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:gateway:7.53:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:ui5:1.0.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html
- http://www.securityfocus.com/bid/109074
- https://cxsecurity.com/ascii/WLB-2019050283
- https://drive.google.com/open?id=1aGFqggvydehSK7MFIsfKW7tO60yiF55f
- https://launchpad.support.sap.com/#/notes/2752614
- https://launchpad.support.sap.com/#/notes/2911267
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575



