Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-26811


SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request leads to Server Side Request Forgery attack which could lead to retrieval of limited pieces of information about the service with no impact on integrity or availability.


Published

2020-11-10T17:15:13.593

Last Modified

2024-11-21T05:20:19.723

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-918

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application sap commerce_cloud_\(accelerator_payment_mock\) 1808 Yes
Application sap commerce_cloud_\(accelerator_payment_mock\) 1811 Yes
Application sap commerce_cloud_\(accelerator_payment_mock\) 1905 Yes
Application sap commerce_cloud_\(accelerator_payment_mock\) 2005 Yes

References