Vulnerability Description
The Omni Commerce Connect API (OCC) of SAP Hybris Commerce, versions 6.*, is vulnerable to server-side request forgery (SSRF) attacks. This is due to a misconfiguration of XML parser that is used in the server-side implementation of OCC.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Hybris | >= 6.0, <= 6.7 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/105339Third Party AdvisoryVDB Entry
- https://launchpad.support.sap.com/#/notes/2680834Permissions RequiredVendor Advisory
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993Vendor Advisory
- http://www.securityfocus.com/bid/105339Third Party AdvisoryVDB Entry
- https://launchpad.support.sap.com/#/notes/2680834Permissions RequiredVendor Advisory
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993Vendor Advisory
FAQ
What is CVE-2018-2463?
CVE-2018-2463 is a vulnerability with a CVSS score of 8.6 (HIGH). The Omni Commerce Connect API (OCC) of SAP Hybris Commerce, versions 6.*, is vulnerable to server-side request forgery (SSRF) attacks. This is due to a misconfiguration of XML parser that is used in t...
How severe is CVE-2018-2463?
CVE-2018-2463 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-2463?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Hybris.