Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-6319


SAP NetWeaver Application Server Java, versions - 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50 allows an unauthenticated attacker to include JavaScript blocks in any web page or URL with different symbols which are otherwise not allowed. On successful exploitation an attacker can steal authentication information of the user, such as data relating to his or her current session and limitedly impact confidentiality and integrity of the application, leading to Reflected Cross Site Scripting.


Published

2020-10-15T02:15:12.593

Last Modified

2024-11-21T05:35:30.093

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.1 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:N/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-79

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application sap netweaver_application_server_java 7.10 Yes
Application sap netweaver_application_server_java 7.11 Yes
Application sap netweaver_application_server_java 7.20 Yes
Application sap netweaver_application_server_java 7.30 Yes
Application sap netweaver_application_server_java 7.31 Yes
Application sap netweaver_application_server_java 7.40 Yes
Application sap netweaver_application_server_java 7.50 Yes

References