Server Side Request Forgery in SAP Commerce Cloud Accelerators
CVE-2020-26811
5.3MEDIUM
Key Information:
- Vendor
- SAP
- Vendor
- CVE Published:
- 10 November 2020
Summary
The SAP Commerce Cloud (Accelerator Payment Mock) vulnerabilities in versions 1808, 1811, 1905, and 2005 allow unauthenticated attackers to exploit the system by sending specially crafted requests to specific module URLs. This can facilitate a Server Side Request Forgery (SSRF) attack, enabling the attacker to retrieve limited information about the service without compromising its integrity or availability.
Affected Version(s)
SAP Commerce Cloud (Accelerator Payment Mock) < 1808 < 1808
SAP Commerce Cloud (Accelerator Payment Mock) < 1811 < 1811
SAP Commerce Cloud (Accelerator Payment Mock) < 1905 < 1905
References
CVSS V3.1
Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved