CVE-2020-6275 vulnerability in SAP Products
Published on June 10, 2020
SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database.
Products Associated with CVE-2020-6275
stack.watch emails you whenever new vulnerabilities are published in SAP Netweaver As Abap or SAP Netweaver Application Server Abap. Just hit a watch button to start following.
Affected Versions
SAP SE SAP Netweaver AS ABAP:- Version < 700 is affected.
- Version < 701 is affected.
- Version < 702 is affected.
- Version < 710 is affected.
- Version < 711 is affected.
- Version < 730 is affected.
- Version < 731 is affected.
- Version < 740 is affected.
- Version < 750 is affected.
- Version < 751 is affected.
- Version < 752 is affected.
- Version < 753 is affected.
- Version < 754 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.