Vulnerability Description
XS Command-Line Interface (CLI) user sessions with the SAP HANA Extended Application Services (XS), version 1, advanced server may have an unintentional prolonged period of validity. Consequently, a platform user could access controller resources via active CLI session even after corresponding authorizations have been revoked meanwhile by an administrator user. Similarly, an attacker who managed to gain access to the platform user's session might misuse the session token even after the session has been closed.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Hana Extended Application Services | 1.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/105091Third Party AdvisoryVDB Entry
- https://launchpad.support.sap.com/#/notes/2590705Permissions RequiredVendor Advisory
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499352742PatchVendor Advisory
- http://www.securityfocus.com/bid/105091Third Party AdvisoryVDB Entry
- https://launchpad.support.sap.com/#/notes/2590705Permissions RequiredVendor Advisory
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499352742PatchVendor Advisory
FAQ
What is CVE-2018-2451?
CVE-2018-2451 is a vulnerability with a CVSS score of 6.6 (MEDIUM). XS Command-Line Interface (CLI) user sessions with the SAP HANA Extended Application Services (XS), version 1, advanced server may have an unintentional prolonged period of validity. Consequently, a p...
How severe is CVE-2018-2451?
CVE-2018-2451 has been rated MEDIUM with a CVSS base score of 6.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-2451?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Hana Extended Application Services.