{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SAP Enable Now version 10","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP BusinessObjects Business Intelligence Platform (Version Management System) versions 420 et 430","product":{"name":"SAP BusinessObjects Business Intelligence","vendor":{"name":"SAP","scada":false}}},{"description":"Product\u2013SAP Commerce versions 1905, 2005, 2105, 2011, 2205","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Commerce versions 1905, 2005, 2105, 2011 et 2205","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Data Services Management Console versions 4.2 et 4.3","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP SQL Anywhere version 17.0","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Customer Data Cloud (Gigya) version 7.4","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP 3D Visual Enterprise Viewer version 9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP BusinessObjects Business Intelligence Platform (BI LaunchPad) versions 420 et 430","product":{"name":"SAP BusinessObjects Business Intelligence","vendor":{"name":"SAP","scada":false}}},{"description":"SAP BusinessObjects Business Intelligence platform (Analysis for OLAP) versions 420 et 430","product":{"name":"SAP BusinessObjects Business Intelligence","vendor":{"name":"SAP","scada":false}}},{"description":"SAP BusinessObjects Business Intelligence Platform (Program Objects) versions 420 et 430","product":{"name":"SAP BusinessObjects Business Intelligence","vendor":{"name":"SAP","scada":false}}},{"description":"SAP BusinessObjects Business Intelligence Platform(Admin Tools/Query Builder) versions 420 et 430","product":{"name":"SAP BusinessObjects Business Intelligence","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Business Objects Platform (MonitoringDB) version 430","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Manufacturing Execution versions 15.1, 15.2 et 15.3","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP BusinessObjects Business Intelligence Platform (CommentaryDB) versions 420 et 430","product":{"name":"SAP BusinessObjects Business Intelligence","vendor":{"name":"SAP","scada":false}}},{"description":"SAP 3D Visual Enterprise Author version 9","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP IQ version 16.1","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-41185","url":"https://www.cve.org/CVERecord?id=CVE-2022-41185"},{"name":"CVE-2022-41206","url":"https://www.cve.org/CVERecord?id=CVE-2022-41206"},{"name":"CVE-2022-39808","url":"https://www.cve.org/CVERecord?id=CVE-2022-39808"},{"name":"CVE-2022-39803","url":"https://www.cve.org/CVERecord?id=CVE-2022-39803"},{"name":"CVE-2022-41175","url":"https://www.cve.org/CVERecord?id=CVE-2022-41175"},{"name":"CVE-2022-41168","url":"https://www.cve.org/CVERecord?id=CVE-2022-41168"},{"name":"CVE-2022-41193","url":"https://www.cve.org/CVERecord?id=CVE-2022-41193"},{"name":"CVE-2022-41174","url":"https://www.cve.org/CVERecord?id=CVE-2022-41174"},{"name":"CVE-2022-41183","url":"https://www.cve.org/CVERecord?id=CVE-2022-41183"},{"name":"CVE-2022-39807","url":"https://www.cve.org/CVERecord?id=CVE-2022-39807"},{"name":"CVE-2022-41169","url":"https://www.cve.org/CVERecord?id=CVE-2022-41169"},{"name":"CVE-2022-35296","url":"https://www.cve.org/CVERecord?id=CVE-2022-35296"},{"name":"CVE-2022-35297","url":"https://www.cve.org/CVERecord?id=CVE-2022-35297"},{"name":"CVE-2022-41197","url":"https://www.cve.org/CVERecord?id=CVE-2022-41197"},{"name":"CVE-2022-41189","url":"https://www.cve.org/CVERecord?id=CVE-2022-41189"},{"name":"CVE-2022-41192","url":"https://www.cve.org/CVERecord?id=CVE-2022-41192"},{"name":"CVE-2022-41180","url":"https://www.cve.org/CVERecord?id=CVE-2022-41180"},{"name":"CVE-2022-41182","url":"https://www.cve.org/CVERecord?id=CVE-2022-41182"},{"name":"CVE-2022-41167","url":"https://www.cve.org/CVERecord?id=CVE-2022-41167"},{"name":"CVE-2022-41191","url":"https://www.cve.org/CVERecord?id=CVE-2022-41191"},{"name":"CVE-2022-39805","url":"https://www.cve.org/CVERecord?id=CVE-2022-39805"},{"name":"CVE-2022-41200","url":"https://www.cve.org/CVERecord?id=CVE-2022-41200"},{"name":"CVE-2022-41210","url":"https://www.cve.org/CVERecord?id=CVE-2022-41210"},{"name":"CVE-2022-39804","url":"https://www.cve.org/CVERecord?id=CVE-2022-39804"},{"name":"CVE-2022-39800","url":"https://www.cve.org/CVERecord?id=CVE-2022-39800"},{"name":"CVE-2021-41184","url":"https://www.cve.org/CVERecord?id=CVE-2021-41184"},{"name":"CVE-2022-41178","url":"https://www.cve.org/CVERecord?id=CVE-2022-41178"},{"name":"CVE-2022-41170","url":"https://www.cve.org/CVERecord?id=CVE-2022-41170"},{"name":"CVE-2022-35226","url":"https://www.cve.org/CVERecord?id=CVE-2022-35226"},{"name":"CVE-2022-41195","url":"https://www.cve.org/CVERecord?id=CVE-2022-41195"},{"name":"CVE-2022-41201","url":"https://www.cve.org/CVERecord?id=CVE-2022-41201"},{"name":"CVE-2022-32244","url":"https://www.cve.org/CVERecord?id=CVE-2022-32244"},{"name":"CVE-2022-41209","url":"https://www.cve.org/CVERecord?id=CVE-2022-41209"},{"name":"CVE-2022-41202","url":"https://www.cve.org/CVERecord?id=CVE-2022-41202"},{"name":"CVE-2022-41172","url":"https://www.cve.org/CVERecord?id=CVE-2022-41172"},{"name":"CVE-2022-41190","url":"https://www.cve.org/CVERecord?id=CVE-2022-41190"},{"name":"CVE-2022-41204","url":"https://www.cve.org/CVERecord?id=CVE-2022-41204"},{"name":"CVE-2022-41171","url":"https://www.cve.org/CVERecord?id=CVE-2022-41171"},{"name":"CVE-2022-41199","url":"https://www.cve.org/CVERecord?id=CVE-2022-41199"},{"name":"CVE-2022-41176","url":"https://www.cve.org/CVERecord?id=CVE-2022-41176"},{"name":"CVE-2022-41198","url":"https://www.cve.org/CVERecord?id=CVE-2022-41198"},{"name":"CVE-2022-41181","url":"https://www.cve.org/CVERecord?id=CVE-2022-41181"},{"name":"CVE-2022-41166","url":"https://www.cve.org/CVERecord?id=CVE-2022-41166"},{"name":"CVE-2022-39013","url":"https://www.cve.org/CVERecord?id=CVE-2022-39013"},{"name":"CVE-2022-41184","url":"https://www.cve.org/CVERecord?id=CVE-2022-41184"},{"name":"CVE-2022-35292","url":"https://www.cve.org/CVERecord?id=CVE-2022-35292"},{"name":"CVE-2022-39802","url":"https://www.cve.org/CVERecord?id=CVE-2022-39802"},{"name":"CVE-2022-31596","url":"https://www.cve.org/CVERecord?id=CVE-2022-31596"},{"name":"CVE-2022-39015","url":"https://www.cve.org/CVERecord?id=CVE-2022-39015"},{"name":"CVE-2022-41196","url":"https://www.cve.org/CVERecord?id=CVE-2022-41196"},{"name":"CVE-2022-41186","url":"https://www.cve.org/CVERecord?id=CVE-2022-41186"},{"name":"CVE-2022-41187","url":"https://www.cve.org/CVERecord?id=CVE-2022-41187"},{"name":"CVE-2022-39806","url":"https://www.cve.org/CVERecord?id=CVE-2022-39806"},{"name":"CVE-2022-41177","url":"https://www.cve.org/CVERecord?id=CVE-2022-41177"},{"name":"CVE-2022-41173","url":"https://www.cve.org/CVERecord?id=CVE-2022-41173"},{"name":"CVE-2022-41188","url":"https://www.cve.org/CVERecord?id=CVE-2022-41188"},{"name":"CVE-2022-41179","url":"https://www.cve.org/CVERecord?id=CVE-2022-41179"},{"name":"CVE-2022-41194","url":"https://www.cve.org/CVERecord?id=CVE-2022-41194"}],"links":[],"reference":"CERTFR-2022-AVI-904","revisions":[{"description":"Version initiale","revision_date":"2022-10-12T00:00:00.000000"}],"risks":[{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Non sp\u00e9cifi\u00e9 par l'\u00e9diteur"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP.\nCertaines d'entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l'\u00e9diteur, une ex\u00e9cution de code\narbitraire \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SAP du 12 octobre 2022","url":"https://dam.sap.com/mac/app/e/pdf/preview/embed/ucQrx6G?ltr=a&rc=1"}]}
