{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"SAP Master Data Governance versions MDG_FND 731, MDG_FND 732, MDG_FND 746, MDG_FND 747, MDG_FND 748, MDG_FND 749, MDG_FND 752, MDG_FND 800, MDG_FND 802, MDG_FND 803, MDG_FND 804, MDG_FND 805, MDG_FND 806, MDG_FND 807, MDG_FND 808 et SAP_BS_FND 702","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP NWBC for HTML versions SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702 et SAP_BASIS 731","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP CRM (WebClient UI) versions S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800 et WEBCUIF 801","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP NetWeaver AS Java (Guided Procedures) version 7.50","product":{"name":"SAP NetWeaver AS Java","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Master Data Governance Material versions 618, 619, 620, 621, 622, 800, 801, 802, 803 et 804","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP NetWeaver Application Server ABAP (SAP Kernel) versions KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.93, KERNEL 7.94 et KRNL64UC 7.53","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Business Client versions 6.5, 7.0 et 7.70","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP NetWeaver AS Java (User Admin Application) version 7.50","product":{"name":"SAP NetWeaver AS Java","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Cloud Connector version 2.0","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Fiori app (\"My Overtime Requests\") versions 605","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"IDES Systems toutes versions","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP ABA (Application Basis) versions 700, 701, 702, 731, 740, 750, 751, 752, 75C et 75I","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP GUI pour Windows et SAP GUI pour Java versions SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757 et SAP_BASIS 758","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"BAM (Bank Account Management) versions SAP_FIN 618, SAP_FIN 730, S4CORE 100 et 101","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP Companion versions ant\u00e9rieures \u00e0 3.1.38","product":{"name":"N/A","vendor":{"name":"SAP","scada":false}}},{"description":"SAP CRM WebClient UI versions S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, S4FND 108, WEBCUIF 700, WEBCUIF 701, WEBCUIF 730, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800 et WEBCUIF 801","product":{"name":"SAP CRM WebClient UI","vendor":{"name":"SAP","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2024-24741","url":"https://www.cve.org/CVERecord?id=CVE-2024-24741"},{"name":"CVE-2024-22132","url":"https://www.cve.org/CVERecord?id=CVE-2024-22132"},{"name":"CVE-2024-24739","url":"https://www.cve.org/CVERecord?id=CVE-2024-24739"},{"name":"CVE-2023-49580","url":"https://www.cve.org/CVERecord?id=CVE-2023-49580"},{"name":"CVE-2024-25643","url":"https://www.cve.org/CVERecord?id=CVE-2024-25643"},{"name":"CVE-2024-24742","url":"https://www.cve.org/CVERecord?id=CVE-2024-24742"},{"name":"CVE-2024-25642","url":"https://www.cve.org/CVERecord?id=CVE-2024-25642"},{"name":"CVE-2024-24740","url":"https://www.cve.org/CVERecord?id=CVE-2024-24740"},{"name":"CVE-2024-22129","url":"https://www.cve.org/CVERecord?id=CVE-2024-22129"},{"name":"CVE-2024-22126","url":"https://www.cve.org/CVERecord?id=CVE-2024-22126"},{"name":"CVE-2024-22128","url":"https://www.cve.org/CVERecord?id=CVE-2024-22128"},{"name":"CVE-2024-22131","url":"https://www.cve.org/CVERecord?id=CVE-2024-22131"},{"name":"CVE-2024-22130","url":"https://www.cve.org/CVERecord?id=CVE-2024-22130"},{"name":"CVE-2023-49058","url":"https://www.cve.org/CVERecord?id=CVE-2023-49058"},{"name":"CVE-2024-24743","url":"https://www.cve.org/CVERecord?id=CVE-2024-24743"}],"links":[],"reference":"CERTFR-2024-AVI-0125","revisions":[{"description":"Version initiale","revision_date":"2024-02-14T00:00:00.000000"}],"risks":[{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"},{"description":"\u00c9l\u00e9vation de privil\u00e8ges"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans SAP. Certaines\nd'entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans SAP","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 SAP february-2024 du 13 f\u00e9vrier 2024","url":"https://support.sap.com/en/my-support/knowledge-base/security-notes-news/february-2024.html"}]}
