The Universal Worklist Configuration in SAP NetWeaver AS JAVA 7.4 allows remote attackers to obtain sensitive user information via a crafted HTTP request, aka SAP Security Note 2256846.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2016/May/55 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/137128/SAP-NetWeaver-AS-JAVA-7.5-Information-Disclosure.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/39841/ | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/43495/ | Exploit Third Party Advisory VDB Entry |
https://erpscan.io/press-center/blog/sap-security-notes-february-2016-review/ | Third Party Advisory |
https://erpscan.io/advisories/erpscan-16-010-sap-netweaver-7-4-information-disclosure/ | Third Party Advisory |
http://packetstormsecurity.com/files/145860/SAP-NetWeaver-J2EE-Engine-7.40-SQL-Injection.html | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2016-02-16 07:59
Updated : 2021-05-05 07:01
NVD link : CVE-2016-2388
Mitre link : CVE-2016-2388
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
sap
- netweaver_application_server_java