Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.106104
Kategorie:Web Servers
Titel:SAP NetWeaver AS Java Multiple Vulnerabilities (2235994, 2234971, 2238375)
Zusammenfassung:SAP NetWeaver Application Server (AS) Java is prone to multiple; vulnerabilities.
Beschreibung:Summary:
SAP NetWeaver Application Server (AS) Java is prone to multiple
vulnerabilities.

Vulnerability Insight:
SAP NetWeaver AS Java contains multiple vulnerabilities:

- CVE-2016-3974: An XML external entity (XXE) vulnerability in the Configuration Wizard allows
remote attackers to cause a denial of service, conduct SMB Relay attacks, or access arbitrary
files via a crafted XML request related to the ctcprotocol servlet.

- CVE-2016-3975: Anonymous attacker can use an XSS vulnerability to hijack session data of
administrators or users of a web resource.

- CVE-2016-3976: An authorized attacker can use a directory traversal attack to read files from
the server and then escalate his or her privileges.

On April 6 2021, Onapsis and SAP released a new threat intelligence report to help SAP customers
protect from active cyber threats seeking to specifically target, identify and compromise
organizations running unprotected SAP applications, through a variety of cyberattack vectors. This
VT is covering one or more vulnerabilities mentioned in that report.

Vulnerability Impact:
A remote attacker may cause a denial of service, access arbitrary
files or hijack user sessions. An authenticated remote attacker may read arbitrary files leading
to privilege escalation.

Affected Software/OS:
SAP NetWeaver AS Java version 7.10 (7.1) through 7.50 (7.5).

Solution:
See the referenced vendor advisories for a solution.

CVSS Score:
6.4

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2016-3974
https://www.exploit-db.com/exploits/39995/
http://seclists.org/fulldisclosure/2016/Jun/41
http://packetstormsecurity.com/files/137527/SAP-NetWeaver-AS-JAVA-7.5-XXE-Injection.html
https://erpscan.io/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/
https://erpscan.io/press-center/blog/sap-security-notes-march-2016-review/
Common Vulnerability Exposure (CVE) ID: CVE-2016-3975
http://seclists.org/fulldisclosure/2016/Jun/42
http://packetstormsecurity.com/files/137529/SAP-NetWeaver-AS-JAVA-7.5-Cross-Site-Scripting.html
https://erpscan.io/advisories/erpscan-16-014-sap-netweaver-7-4-navigationurltester/
Common Vulnerability Exposure (CVE) ID: CVE-2016-3976
https://www.exploit-db.com/exploits/39996/
http://seclists.org/fulldisclosure/2016/Jun/40
http://packetstormsecurity.com/files/137528/SAP-NetWeaver-AS-JAVA-7.5-Directory-Traversal.html
https://erpscan.io/advisories/erpscan-16-012/
https://launchpad.support.sap.com/#/notes/2234971
CopyrightCopyright (C) 2016 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.