In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administrative user, can acquire the credentials from the logs. This leads to a high impact on confidentiality, with no impact on integrity or availability.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Nov 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 12 Nov 2024 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In SAP NetWeaver Java (Software Update Manager 1.1), under certain conditions when a software upgrade encounters errors, credentials are written in plaintext to a log file. An attacker with local access to the server, authenticated as a non-administrative user, can acquire the credentials from the logs. This leads to a high impact on confidentiality, with no impact on integrity or availability. | |
Title | Information Disclosure vulnerability in SAP NetWeaver Java (Software Update Manager) | |
Weaknesses | CWE-522 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: sap
Published:
Updated: 2024-11-12T20:13:33.683Z
Reserved: 2024-09-27T20:05:59.021Z
Link: CVE-2024-47588

Updated: 2024-11-12T16:05:57.264Z

Status : Awaiting Analysis
Published: 2024-11-12T01:15:04.700
Modified: 2024-11-12T13:55:21.227
Link: CVE-2024-47588

No data.