Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-6308

EPSS 82.06% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-6308

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
SAP BusinessObjects Business Intelligence Platform (Web Services) versions - 410, 420, 430, allows an unauthenticated attacker to inject arbitrary values as CMS parameters to perform lookups on the internal network which is otherwise not accessible externally. On successful exploitation, attacker can scan internal network to determine internal infrastructure and gather information for further attacks like remote file inclusion, retrieve server files, bypass firewall and force the vulnerable server to perform malicious requests, resulting in a Server-Side Request Forgery vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
SAP 多款产品代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SAP BusinessObjects Business Intelligence Platform是德国思爱普(SAP)公司的一套商务智能软件和企业绩效解决方案套件。该产品具有报告生成、分析、数据可视化等功能。 SAP 存在安全漏洞,目前尚无此漏洞的相关信息,请随时关注CNNVD或厂商公告。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
SAP SESAP BusinessObjects Business Intelligence Platform (Web Services) < 410 -

II. Public POCs for CVE-2020-6308

#POC DescriptionSource LinkShenlong Link
1PoC CVE-2020-6308https://github.com/InitRoot/CVE-2020-6308-PoCPOC Details
2CVE-2020-6308 mass exploiter/fuzzer.https://github.com/freeFV/CVE-2020-6308-mass-exploiterPOC Details
3Exploit script for SAP Business Objects SSRFhttps://github.com/TheMMMdev/CVE-2020-6308POC Details
4This script exploits and performs an SSRF (Server-Side Request Forgery) and Timing Attack against the SAP BusinessObjects Launchpad (CVE-2020-6308). It attempts to determine the status of various ports on a target IP address by measuring the response time of the application when attempting to authenticate against it.https://github.com/MachadoOtto/sap_bo_launchpad-ssrf-timing_attackPOC Details
5SAP BusinessObjects Business Intelligence Platform (Web Services) 410, 420, and 430 is susceptible to blind server-side request forgery. An attacker can inject arbitrary values as CMS parameters to perform lookups on the internal network, which is otherwise not accessible externally. On successful exploitation, attacker can scan network to determine infrastructure and gather information for further attacks like remote file inclusion, retrieving server files, bypassing firewall, and forcing malicious requests. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-6308.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-6308

登录查看更多情报信息。

Same Patch Batch · SAP SE · 2020-10-20 · 7 CVEs total

CVE-2020-6370SAP 跨站脚本漏洞
CVE-2020-6367SAP NetWeaver Composite Application Framework 跨站脚本漏洞
CVE-2020-6362SAP 安全漏洞
CVE-2020-6369SAP Solution Manager和SAP Focused Run 安全漏洞
CVE-2020-6366SAP 输入验证错误漏洞
CVE-2020-6315SAP BusinessObjects Business Intelligence Platform 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-6308

No comments yet


Leave a comment