CVE Vulnerabilities

CVE-2020-6282

Server-Side Request Forgery (SSRF)

Published: Jul 14, 2020 | Modified: Jul 15, 2020
CVSS 3.x
5.8
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
Ubuntu

SAP NetWeaver AS JAVA (IIOP service) (SERVERCORE), versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, and SAP NetWeaver AS JAVA (IIOP service) (CORE-TOOLS), versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker to send a crafted request from a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability.

Weakness

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Affected Software

Name Vendor Start Version End Version
Netweaver_application_server_java Sap 7.10 (including) 7.10 (including)
Netweaver_application_server_java Sap 7.11 (including) 7.11 (including)
Netweaver_application_server_java Sap 7.20 (including) 7.20 (including)
Netweaver_application_server_java Sap 7.30 (including) 7.30 (including)
Netweaver_application_server_java Sap 7.31 (including) 7.31 (including)
Netweaver_application_server_java Sap 7.40 (including) 7.40 (including)
Netweaver_application_server_java Sap 7.50 (including) 7.50 (including)

References