First published: Wed Feb 12 2020(Updated: )
Certain vulnerable endpoints in SAP NetWeaver AS Java (Heap Dump Application), versions 7.30, 7.31, 7.40, 7.50, provide valuable information about the system like hostname, server node and installation path that could be misused by an attacker leading to Information Disclosure.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server Java | =7.30 | |
SAP NetWeaver Application Server Java | =7.31 | |
SAP NetWeaver Application Server Java | =7.40 | |
SAP NetWeaver Application Server Java | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6190 is a vulnerability in SAP NetWeaver AS Java (Heap Dump Application) versions 7.30, 7.31, 7.40, and 7.50 that could lead to Information Disclosure.
CVE-2020-6190 has a severity rating of 5.8 (medium).
CVE-2020-6190 allows attackers to obtain sensitive information about the system, such as hostname, server node, and installation path, which can be misused to perform further attacks.
CVE-2020-6190 affects SAP NetWeaver AS Java versions 7.30, 7.31, 7.40, and 7.50.
To mitigate the CVE-2020-6190 vulnerability, it is recommended to apply the patches provided by SAP as mentioned in the SAP Notes: <a href='https://launchpad.support.sap.com/#/notes/2838835'>2838835</a> and <a href='https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=537788812'>537788812</a>.