CVE-2020-6275
Severity CVSS v4.0:
Pending analysis
Type:
CWE-918
Server-Side Request Forgery (SSRF)
Publication date:
10/06/2020
Last modified:
05/10/2022
Description
SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
6.80
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sap:netweaver_application_server_abap:700:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:netweaver_application_server_abap:701:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:netweaver_application_server_abap:702:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:netweaver_application_server_abap:710:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:netweaver_application_server_abap:711:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:netweaver_application_server_abap:730:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:netweaver_application_server_abap:752:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



