First published: Tue Apr 14 2020(Updated: )
SAP NetWeaver AS Java (HTTP Service), versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker with administrator privileges to access user sensitive data such as passwords in trace files, when the user logs in and sends request with login credentials, leading to Information Disclosure.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server Java | =7.10 | |
SAP NetWeaver Application Server Java | =7.11 | |
SAP NetWeaver Application Server Java | =7.20 | |
SAP NetWeaver Application Server Java | =7.30 | |
SAP NetWeaver Application Server Java | =7.31 | |
SAP NetWeaver Application Server Java | =7.40 | |
SAP NetWeaver Application Server Java | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6224 is a vulnerability in SAP NetWeaver AS Java (HTTP Service) versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50 that allows an attacker with administrator privileges to access user sensitive data.
An attacker with administrator privileges can exploit CVE-2020-6224 by accessing user sensitive data, such as passwords, in trace files when the user logs in and sends requests with login credentials.
CVE-2020-6224 has a severity score of 6.2, indicating a medium severity.
Versions 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, and 7.50 of SAP NetWeaver AS Java are affected by CVE-2020-6224.
To fix CVE-2020-6224, it is recommended to apply the necessary patches or updates provided by SAP.