Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2020-26836Open Redirect in SE SAP Solution Manager

CWE-601Open Redirect5 documents5 sources
Severity
6.1MEDIUMNVD
EPSS
5.0%
top 10.33%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedDec 9
Latest updateMay 24

Description

SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages2 packages

🔴Vulnerability Details

3
GHSA
GHSA-v865-wgvp-j2q9: SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability,2022-05-24
CVEList
CVE-2020-26836: SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability,2020-12-09
VulnCheck
SAP Solution Manager URL Redirection to Untrusted Site ('Open Redirect')2020

💥Exploits & PoCs

1
Nuclei
SAP Solution Manager - Open Redirect
CVE-2020-26836 — Open Redirect | cvebase