First published: Tue Sep 10 2019(Updated: )
Attackers may misuse an HTTP/REST endpoint of SAP HANA Extended Application Services (Advanced model), before version 1.0.118, to overload the server or retrieve information about internal network ports.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP HANA Extended Application Services, Advanced Model | <1.0.118 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0363 has a medium severity level due to potential server overload and information disclosure risks.
To mitigate CVE-2019-0363, upgrade your SAP HANA Extended Application Services to version 1.0.118 or later.
CVE-2019-0363 affects SAP HANA Extended Application Services versions prior to 1.0.118.
Using CVE-2019-0363, attackers can overload the server or retrieve sensitive internal network port information.
Yes, CVE-2019-0363 is related to the HTTP/REST endpoints of the SAP HANA Extended Application Services web application.