Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Cloud_connector
(Sap)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 8 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-09-15 | CVE-2021-33692 | SAP Cloud Connector, version - 2.0, allows the upload of zip files as backup. This backup file can be tricked to inject special elements such as '..' and '/' separators, for attackers to escape outside of the restricted location to access files or directories. | Cloud_connector | 7.5 | ||
2021-09-15 | CVE-2021-33693 | SAP Cloud Connector, version - 2.0, allows an authenticated administrator to modify a configuration file to inject malicious codes that could potentially lead to OS command execution. | Cloud_connector | 6.8 | ||
2021-09-15 | CVE-2021-33694 | SAP Cloud Connector, version - 2.0, does not sufficiently encode user-controlled inputs, allowing an attacker with Administrator rights, to include malicious codes that get stored in the database, and when accessed, could be executed in the application, resulting in Stored Cross-Site Scripting. | Cloud_connector | 4.8 | ||
2021-09-15 | CVE-2021-33695 | Potentially, SAP Cloud Connector, version - 2.0 communication with the backend is accepted without sufficient validation of the certificate. | Cloud_connector | 9.1 | ||
2023-12-12 | CVE-2023-49578 | SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity of the application. | Cloud_connector | 3.5 | ||
2024-02-13 | CVE-2024-25642 | Due to improper validation of certificate in SAP Cloud Connector - version 2.0, attacker can impersonate the genuine servers to interact with SCC breaking the mutual authentication. Hence, the attacker can intercept the request to view/modify sensitive information. There is no impact on the availability of the system. | Cloud_connector | 7.4 | ||
2019-01-08 | CVE-2019-0247 | SAP Cloud Connector, before version 2.11.3, allows an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application. | Cloud_connector | 9.8 | ||
2019-01-08 | CVE-2019-0246 | SAP Cloud Connector, before version 2.11.3, does not perform any authentication checks for functionalities that require user identity. | Cloud_connector | 9.8 |