Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2024-34692
Analyzed
More InfoOfficial Page
Source-cna@sap.com
View Known Exploited Vulnerability (KEV) details
Published At-09 Jul, 2024 | 05:15
Updated At-09 Sep, 2024 | 15:33

Due to missing verification of file type or content, SAP Enable Now allows an authenticated attacker to upload arbitrary files. These files include executables which might be downloaded and executed by the user which could host malware. On successful exploitation an attacker can cause limited impact on confidentiality and Integrity of the application.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.14.6MEDIUM
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Secondary3.13.3LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
Type: Primary
Version: 3.1
Base score: 4.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 3.3
Base severity: LOW
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
CPE Matches

SAP SE
sap
>>enable_now>>*
cpe:2.3:a:sap:enable_now:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-434Primarycna@sap.com
CWE ID: CWE-434
Type: Primary
Source: cna@sap.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://me.sap.com/notes/3476340cna@sap.com
Permissions Required
https://url.sap/sapsecuritypatchdaycna@sap.com
Vendor Advisory
Hyperlink: https://me.sap.com/notes/3476340
Source: cna@sap.com
Resource:
Permissions Required
Hyperlink: https://url.sap/sapsecuritypatchday
Source: cna@sap.com
Resource:
Vendor Advisory
Change History
0Changes found

Details not found