CVE-2020-26815Server-Side Request Forgery in SE SAP Fiori Launchpad

Severity
8.6HIGHNVD
EPSS
0.3%
top 48.91%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 10
Latest updateMay 24

Description

SAP Fiori Launchpad (News tile Application), versions - 750,751,752,753,754,755, allows an unauthorized attacker to send a crafted request to a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network to retrieve sensitive / confidential resources which are otherwise restricted for internal usage only, resulting in a Server-Side Request Forgery vulnerability.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:NExploitability: 3.9 | Impact: 4.0

Affected Packages2 packages

CVEListV5sap_se/sap_fiori_launchpad< 750+5
NVDsap/fiori_launchpad6 versions+5

🔴Vulnerability Details

2
GHSA
GHSA-9v9g-4ghw-xrxx: SAP Fiori Launchpad (News tile Application), versions - 750,751,752,753,754,755, allows an unauthorized attacker to send a crafted request to a vulner2022-05-24
CVEList
CVE-2020-26815: SAP Fiori Launchpad (News tile Application), versions - 750,751,752,753,754,755, allows an unauthorized attacker to send a crafted request to a vulner2020-11-10
CVE-2020-26815 — Server-Side Request Forgery | cvebase