In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administrative user, can acquire the credentials from the logs. This leads to a high impact on confidentiality, with no impact on integrity or availability.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 Nov 2024 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administrative user, can acquire the credentials from the logs. This leads to a high impact on confidentiality, with no impact on integrity or availability. | |
| Title | Information Disclosure vulnerability in SAP NetWeaver Java (Software Update Manager) | |
| Weaknesses | CWE-522 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: sap
Published: 2024-11-12T00:26:10.765Z
Updated: 2024-11-12T20:13:33.683Z
Reserved: 2024-09-27T20:05:59.021Z
Link: CVE-2024-47588
Updated: 2024-11-12T16:05:57.264Z
Status : Awaiting Analysis
Published: 2024-11-12T01:15:04.700
Modified: 2024-11-12T13:55:21.227
Link: CVE-2024-47588
No data.