SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request leads to Server Side Request Forgery attack which could lead to retrieval of limited pieces of information about the service with no impact on integrity or availability.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2975170 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571 | Vendor Advisory |
http://seclists.org/fulldisclosure/2021/Jun/26 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/163143/SAP-Hybris-eCommerce-Server-Side-Request-Forgery.html | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-11-10 09:15
Updated : 2021-06-17 10:20
NVD link : CVE-2020-26811
Mitre link : CVE-2020-26811
JSON object : View
CWE
CWE-918
Server-Side Request Forgery (SSRF)
Products Affected
sap
- commerce_cloud_\(accelerator_payment_mock\)