Vulnerability Description
SAP NetWeaver for Java Application Server - Web Container, (engineapi, versions 7.1, 7.2, 7.3, 7.31, 7.4 and 7.5), (servercode, versions 7.2, 7.3, 7.31, 7.4, 7.5), allows an attacker to upload files (including script files) without proper file format validation.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sap | Netweaver Application Server Java | 7.10 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/109071Third Party AdvisoryVDB Entry
- https://launchpad.support.sap.com/#/notes/2777910Permissions RequiredVendor Advisory
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575Vendor Advisory
- http://www.securityfocus.com/bid/109071Third Party AdvisoryVDB Entry
- https://launchpad.support.sap.com/#/notes/2777910Permissions RequiredVendor Advisory
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=523994575Vendor Advisory
FAQ
What is CVE-2019-0327?
CVE-2019-0327 is a vulnerability with a CVSS score of 7.2 (HIGH). SAP NetWeaver for Java Application Server - Web Container, (engineapi, versions 7.1, 7.2, 7.3, 7.31, 7.4 and 7.5), (servercode, versions 7.2, 7.3, 7.31, 7.4, 7.5), allows an attacker to upload files (...
How severe is CVE-2019-0327?
CVE-2019-0327 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-0327?
Check the references section above for vendor advisories and patch information. Affected products include: Sap Netweaver Application Server Java.