{"containers":{"cna":{"affected":[{"product":"SAP Commerce","vendor":"SAP SE","versions":[{"status":"affected","version":"< 6.7"},{"status":"affected","version":"< 1808"},{"status":"affected","version":"< 1811"},{"status":"affected","version":"< 1905"},{"status":"affected","version":"< 2005"}]}],"descriptions":[{"lang":"en","value":"SAP Commerce versions 6.7, 1808, 1811, 1905, 2005 contains the jSession ID in the backoffice URL when the application is loaded initially. An attacker can get this session ID via shoulder surfing or man in the middle attack and subsequently get access to admin user accounts, leading to Session Fixation and complete compromise of the confidentiality, integrity and availability of the application."}],"metrics":[{"cvssV3_0":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":6.4,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H","version":"3.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-384","description":"CWE-384 (Session Fixation)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-09-09T12:52:14.000Z","orgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","shortName":"sap"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700"},{"tags":["x_refsource_MISC"],"url":"https://launchpad.support.sap.com/#/notes/2934451"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cna@sap.com","ID":"CVE-2020-6302","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"SAP Commerce","version":{"version_data":[{"version_name":"<","version_value":"6.7"},{"version_name":"<","version_value":"1808"},{"version_name":"<","version_value":"1811"},{"version_name":"<","version_value":"1905"},{"version_name":"<","version_value":"2005"}]}}]},"vendor_name":"SAP SE"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"SAP Commerce versions 6.7, 1808, 1811, 1905, 2005 contains the jSession ID in the backoffice URL when the application is loaded initially. An attacker can get this session ID via shoulder surfing or man in the middle attack and subsequently get access to admin user accounts, leading to Session Fixation and complete compromise of the confidentiality, integrity and availability of the application."}]},"impact":{"cvss":{"baseScore":"6.4","vectorString":"CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-384 (Session Fixation)"}]}]},"references":{"reference_data":[{"name":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700","refsource":"MISC","url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700"},{"name":"https://launchpad.support.sap.com/#/notes/2934451","refsource":"MISC","url":"https://launchpad.support.sap.com/#/notes/2934451"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T08:55:22.407Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=557449700"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://launchpad.support.sap.com/#/notes/2934451"}]}]},"cveMetadata":{"assignerOrgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","assignerShortName":"sap","cveId":"CVE-2020-6302","datePublished":"2020-09-09T12:52:14.000Z","dateReserved":"2020-01-08T00:00:00.000Z","dateUpdated":"2024-08-04T08:55:22.407Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}