{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-33005","assignerOrgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","state":"PUBLISHED","assignerShortName":"sap","dateReserved":"2024-04-23T04:04:25.521Z","datePublished":"2024-08-13T03:47:44.829Z","dateUpdated":"2024-08-13T13:29:16.927Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"SAP NetWeaver Application Server (ABAP and Java),SAP Web Dispatcher and SAP Content Server","vendor":"SAP_SE","versions":[{"status":"affected","version":"KRNL64NUC 7.22"},{"status":"affected","version":"KRNL64NUC 7.22EXT"},{"status":"affected","version":"KRNL64UC 7.22"},{"status":"affected","version":"KRNL64UC 7.22EXT"},{"status":"affected","version":"KRNL64UC 7.53"},{"status":"affected","version":"WEBDISP 7.53"},{"status":"affected","version":"WEBDISP 7.77"},{"status":"affected","version":"WEBDISP 7.85"},{"status":"affected","version":"WEBDISP 7.22_EXT"},{"status":"affected","version":"WEBDISP 7.89"},{"status":"affected","version":"WEBDISP 7.54"},{"status":"affected","version":"WEBDISP 7.93"},{"status":"affected","version":"KERNEL 7.22"},{"status":"affected","version":"KERNEL 7.53"},{"status":"affected","version":"KERNEL 7.77"},{"status":"affected","version":"KERNEL 7.85"},{"status":"affected","version":"KERNEL 7.89"},{"status":"affected","version":"KERNEL 7.54"},{"status":"affected","version":"KERNEL 7.93"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Due to the missing authorization checks in the\nlocal systems, the admin users of SAP Web Dispatcher, SAP NetWeaver Application\nServer (ABAP and Java), and SAP Content Server can impersonate other users and\nmay perform some unintended actions. This could lead to a low impact on\nconfidentiality and a high impact on the integrity and availability of the\napplications."}],"value":"Due to the missing authorization checks in the\nlocal systems, the admin users of SAP Web Dispatcher, SAP NetWeaver Application\nServer (ABAP and Java), and SAP Content Server can impersonate other users and\nmay perform some unintended actions. This could lead to a low impact on\nconfidentiality and a high impact on the integrity and availability of the\napplications."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-862","description":"CWE-862: Missing Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"e4686d1a-f260-4930-ac4c-2f5c992778dd","shortName":"sap","dateUpdated":"2024-08-13T03:47:44.829Z"},"references":[{"url":"https://me.sap.com/notes/3438085"},{"url":"https://url.sap/sapsecuritypatchday"}],"source":{"discovery":"UNKNOWN"},"title":"Missing Authorization check in SAP NetWeaver Application Server (ABAP and Java),SAP Web Dispatcher and SAP Content Server","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-13T13:28:54.486408Z","id":"CVE-2024-33005","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-13T13:29:16.927Z"}}]}}