Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
f5f650f
commit 8e504c9
Showing
38 changed files
with
508 additions
and
6 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2365](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2365) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20NetWeaver%20Portal%20WebDynpro%20RunTime&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%207.30%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting%20(XSS)&color=brighgreen) | ||
|
||
### Description | ||
|
||
SAP NetWeaver Portal, WebDynpro Java, 7.30, 7.31, 7.40, 7.50, does not sufficiently encode user controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2367](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2367) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20BASIS%20(ABAP%20File%20Interface)&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%20from%207.00%20to%207.02%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Directory%20Traversal&color=brighgreen) | ||
|
||
### Description | ||
|
||
ABAP File Interface in, SAP BASIS, from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52, allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing "traverse to parent directory" are passed through to the file APIs. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2368](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2368) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20NetWeaver%20System%20Landscape%20Directory%2C%20LM-Core&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%207.10%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Missing%20Authentication%20Check&color=brighgreen) | ||
|
||
### Description | ||
|
||
SAP NetWeaver System Landscape Directory, LM-CORE 7.10, 7.20, 7.30, 7.31, 7.40, does not perform any authentication checks for functionalities that require user identity. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2369](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2369) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20HANA&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.00%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) | ||
|
||
### Description | ||
|
||
Under certain conditions SAP HANA, 1.00, 2.00, allows an unauthenticated attacker to access information which would otherwise be restricted. An attacker can misuse the authentication function of the SAP HANA server on its SQL interface and disclose 8 bytes of the server process memory. The attacker cannot influence or predict the location of the leaked memory. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2370](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2370) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20BI%20Launchpad&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%204.00%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Server%20Side%20Request%20Forgery%20(SSRF)&color=brighgreen) | ||
|
||
### Description | ||
|
||
Server Side Request Forgery (SSRF) vulnerability in SAP Central Management Console, BI Launchpad and Fiori BI Launchpad, 4.10, from 4.20, from 4.30, could allow a malicious user to use common techniques to determine which ports are in use on the backend server. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2371](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2371) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20NetWeaver%20Java%20Web%20Application&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%207.50%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Cross-Site%20Scripting%20(XSS)&color=brighgreen) | ||
|
||
### Description | ||
|
||
The SAML 2.0 service provider of SAP Netweaver AS Java Web Application, 7.50, does not sufficiently encode user controlled inputs, which results in Cross-Site Scripting (XSS) vulnerability. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2372](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2372) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20HANA%20Extended%20Application%20Services&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) | ||
|
||
### Description | ||
|
||
A plain keystore password is written to a system log file in SAP HANA Extended Application Services, 1.0, which could endanger confidentiality of SSL communication. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2374](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2374) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20HANA%20Extended%20Application%20Services&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) | ||
|
||
### Description | ||
|
||
In SAP HANA Extended Application Services, 1.0, a controller user who has SpaceAuditor authorization in a specific space could retrieve sensitive application data like service bindings within that space. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2377](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2377) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20HANA%20Extended%20Application%20Services&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) | ||
|
||
### Description | ||
|
||
In SAP HANA Extended Application Services, 1.0, some general server statistics and status information could be retrieved by unauthorized users. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2378](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2378) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20HANA%20Extended%20Application%20Services&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) | ||
|
||
### Description | ||
|
||
In SAP HANA Extended Application Services, 1.0, unauthorized users can read statistical data about deployed applications including resource consumption. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2379](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2379) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20HANA%20Extended%20Application%20Services&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%201.0%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) | ||
|
||
### Description | ||
|
||
In SAP HANA Extended Application Services, 1.0, an unauthenticated user could test if a given username is valid by evaluating error messages of a specific endpoint. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2381](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2381) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20ERP%20Financials%20Information%20System&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%202.00%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Missing%20Authorization%20Check&color=brighgreen) | ||
|
||
### Description | ||
|
||
SAP ERP Financials Information System (SAP_APPL 6.00, 6.02, 6.03, 6.04, 6.05, 6.06, 6.16; SAP_FIN 6.17, 6.18, 7.00, 7.20, 7.30 S4CORE 1.00, 1.01, 1.02) does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2382](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2382) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Internet%20Graphics%20Server&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%207.20%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen) | ||
|
||
### Description | ||
|
||
A vulnerability in the SAP internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53, could allow a malicious user to store graphics in a controlled area and as such gain information from system area, which is not available to the user otherwise. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2383](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2383) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Internet%20Graphics%20Server&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%207.20%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Reflected%20Cross-Site%20Scripting&color=brighgreen) | ||
|
||
### Description | ||
|
||
Reflected cross-site scripting vulnerability in SAP internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2384](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2384) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Internet%20Graphics%20Server&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%207.20%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial-of-Service&color=brighgreen) | ||
|
||
### Description | ||
|
||
Under certain conditions a malicious user provoking a Null Pointer dereference can prevent legitimate users from accessing the SAP Internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53, and its services. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
### [CVE-2018-2385](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2385) | ||
![](https://img.shields.io/static/v1?label=Product&message=SAP%20Internet%20Graphics%20Server&color=blue) | ||
![](https://img.shields.io/static/v1?label=Version&message=%3D%207.20%20&color=brighgreen) | ||
![](https://img.shields.io/static/v1?label=Vulnerability&message=Denial-of-Service&color=brighgreen) | ||
|
||
### Description | ||
|
||
Under certain conditions a malicious user provoking a divide by zero crash can prevent legitimate users from accessing the SAP Internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53, and its services. | ||
|
||
### POC | ||
|
||
#### Reference | ||
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | ||
|
||
#### Github | ||
No PoCs found on GitHub currently. | ||
|
Oops, something went wrong.