First published: Wed Jul 10 2019(Updated: )
The SAP Gateway, versions 7.5, 7.51, 7.52 and 7.53, allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it's not.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Gateway | =7.5 | |
SAP Gateway | =7.51 | |
SAP Gateway | =7.52 | |
SAP Gateway | =7.53 | |
SAP UI5 | =1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this SAP Gateway vulnerability is CVE-2019-0319.
The severity level of CVE-2019-0319 is high with a severity value of 7.5.
The versions 7.5, 7.51, 7.52, and 7.53 of SAP Gateway are affected by this vulnerability.
An attacker can exploit CVE-2019-0319 by injecting content that is displayed as an error message, potentially misleading users.
Yes, you can find references for CVE-2019-0319 [here](http://packetstormsecurity.com/files/153661/SAPUI5-1.0.0-SAP-Gateway-7.5-7.51-7.52-7.53-Content-Spoofing.html), [here](http://www.securityfocus.com/bid/109074), and [here](https://cxsecurity.com/ascii/WLB-2019050283).