cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-47577,https://securityvulnerability.io/vulnerability/CVE-2024-47577,Information Disclosure Vulnerability in SAP Commerce Cloud Assisted Service Module,"Webservice API endpoints for Assisted Service Module within SAP Commerce Cloud has information disclosure vulnerability. When an authorized agent searches for customer to manage their accounts, the request url includes customer data and it is recorded in server logs. If an attacker impersonating as authorized admin visits such server logs, then they get access to the customer data. The amount of leaked confidential data however is extremely limited, and the attacker has no control over what data is leaked.",SAP,SAP Commerce Cloud,2.7,LOW,0.0004299999854993075,false,false,false,false,,false,false,2024-12-10T00:11:49.563Z,0 CVE-2024-33003,https://securityvulnerability.io/vulnerability/CVE-2024-33003,OCC API Endpoints Vulnerable to PII Data Exposure,"A vulnerability has been identified in certain OCC API endpoints of SAP Commerce Cloud, which allows for the exposure of Personally Identifiable Information (PII). This issue occurs when sensitive data, such as passwords, email addresses, mobile numbers, coupon codes, and voucher codes, is included directly in the request URL, either as query or path parameters. The compromised integrity and confidentiality of this information can have serious repercussions, making it crucial for organizations using affected versions to assess their security posture. To mitigate the risks associated with this vulnerability, users are advised to apply the appropriate security patches and review their API endpoint configurations.",SAP,SAP Commerce Cloud,9.1,CRITICAL,0.000910000002477318,false,false,false,false,,false,false,2024-08-13T03:36:55.034Z,0 CVE-2023-42481,https://securityvulnerability.io/vulnerability/CVE-2023-42481,Improper Access Control vulnerability in SAP Commerce Cloud,"In SAP Commerce Cloud, specifically in multiple versions such as HY_COM 1905 and others, an access control vulnerability allows a locked B2B user to exploit the forgotten password feature to restore their access. This misuse occurs particularly when the Composable Storefront is utilized, exposing significant risks to both confidentiality and integrity within the system. Weak access control measures fail to prevent unauthorized account recovery, raising concerns for organizations relying on SAP for secure e-commerce solutions.",SAP,SAP Commerce Cloud,8.1,HIGH,0.0006399999838322401,false,false,false,false,,false,false,2023-12-12T01:15:00.000Z,0 CVE-2021-33666,https://securityvulnerability.io/vulnerability/CVE-2021-33666,,"When SAP Commerce Cloud version 100, hosts a JavaScript storefront, it is vulnerable to MIME sniffing, which, in certain circumstances, could be used to facilitate an XSS attack or malware proliferation.",SAP,SAP Commerce Cloud,4.7,MEDIUM,0.0008399999933317304,false,false,false,false,,false,false,2021-06-09T13:32:45.000Z,0 CVE-2021-21445,https://securityvulnerability.io/vulnerability/CVE-2021-21445,,"SAP Commerce Cloud, versions - 1808, 1811, 1905, 2005, 2011, allows an authenticated attacker to include invalidated data in the HTTP response Content Type header, due to improper input validation, and sent to a Web user. A successful exploitation of this vulnerability may lead to advanced attacks, including cross-site scripting and page hijacking.",SAP,SAP Commerce Cloud,5.4,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2021-01-12T14:42:03.000Z,0 CVE-2020-26810,https://securityvulnerability.io/vulnerability/CVE-2020-26810,,"SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request can render the SAP Commerce service itself unavailable leading to Denial of Service with no impact on confidentiality or integrity.",SAP,SAP Commerce Cloud (accelerator Payment Mock),7.5,HIGH,0.0012400000123307109,false,false,false,false,,false,false,2020-11-10T16:20:28.000Z,0 CVE-2020-26811,https://securityvulnerability.io/vulnerability/CVE-2020-26811,,"SAP Commerce Cloud (Accelerator Payment Mock), versions - 1808, 1811, 1905, 2005, allows an unauthenticated attacker to submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction, the crafted request leads to Server Side Request Forgery attack which could lead to retrieval of limited pieces of information about the service with no impact on integrity or availability.",SAP,SAP Commerce Cloud (accelerator Payment Mock),5.3,MEDIUM,0.0020200000144541264,false,false,false,false,,false,false,2020-11-10T16:12:03.000Z,0 CVE-2020-26809,https://securityvulnerability.io/vulnerability/CVE-2020-26809,,"SAP Commerce Cloud, versions- 1808,1811,1905,2005, allows an attacker to bypass existing authentication and permission checks via the '/medias' endpoint hence gaining access to Secure Media folders. This folder could contain sensitive files that results in disclosure of sensitive information and impact system configuration confidentiality.",SAP,SAP Commerce Cloud,5.3,MEDIUM,0.0015999999595806003,false,false,false,false,,false,false,2020-11-10T16:10:56.000Z,0 CVE-2020-6363,https://securityvulnerability.io/vulnerability/CVE-2020-6363,,"SAP Commerce Cloud, versions - 1808, 1811, 1905, 2005, exposes several web applications that maintain sessions with a user. These sessions are established after the user has authenticated with username/passphrase credentials. The user can change their own passphrase, but this does not invalidate active sessions that the user may have with SAP Commerce Cloud web applications, which gives an attacker the opportunity to reuse old session credentials, resulting in Insufficient Session Expiration.",SAP,SAP Commerce Cloud,4.6,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2020-10-15T01:53:18.000Z,0 CVE-2020-6272,https://securityvulnerability.io/vulnerability/CVE-2020-6272,,"SAP Commerce Cloud versions - 1808, 1811, 1905, 2005, does not sufficiently encode user inputs, which allows an authenticated and authorized content manager to inject malicious script into several web CMS components. These can be saved and later triggered, if an affected web page is visited, resulting in Cross-Site Scripting (XSS) vulnerability.",SAP,SAP Commerce Cloud,5.4,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2020-10-15T01:46:38.000Z,0 CVE-2020-6201,https://securityvulnerability.io/vulnerability/CVE-2020-6201,,"The SAP Commerce (Testweb Extension), versions- 6.6, 6.7, 1808, 1811, 1905, does not sufficiently encode user-controlled inputs, due to which certain GET URL parameters are reflected in the HTTP responses without escaping/sanitization, leading to Reflected Cross Site Scripting.",SAP,SAP Commerce Cloud (testweb Extension),6.1,MEDIUM,0.0008399999933317304,false,false,false,false,,false,false,2020-03-10T20:19:04.000Z,0 CVE-2020-6200,https://securityvulnerability.io/vulnerability/CVE-2020-6200,,"The SAP Commerce (SmartEdit Extension), versions- 6.6, 6.7, 1808, 1811, is vulnerable to client-side angularjs template injection, a variant of Cross-Site-Scripting (XSS) that exploits the templating facilities of the angular framework.",SAP,SAP Commerce Cloud (smartedit Extension),5.4,MEDIUM,0.000539999979082495,false,false,false,false,,false,false,2020-03-10T20:18:50.000Z,0 CVE-2019-0344,https://securityvulnerability.io/vulnerability/CVE-2019-0344,,"Due to unsafe deserialization used in SAP Commerce Cloud (virtualjdbc extension), versions 6.4, 6.5, 6.6, 6.7, 1808, 1811, 1905, it is possible to execute arbitrary code on a target machine with 'Hybris' user rights, resulting in Code Injection.",SAP,SAP Commerce Cloud (virtualjdbc Extension),9.8,CRITICAL,0.2835400104522705,true,false,false,true,,false,false,2019-08-14T13:53:21.000Z,0 CVE-2019-0343,https://securityvulnerability.io/vulnerability/CVE-2019-0343,,"SAP Commerce Cloud (Mediaconversion Extension), versions 6.4, 6.5, 6.6, 6.7, 1808, 1811, 1905, allows an authenticated Backoffice/HMC user to inject code that can be executed by the application, leading to Code Injection. An attacker could thereby control the behavior of the application.",SAP,SAP Commerce Cloud (mediaconversion Extension),8.8,HIGH,0.0008999999845400453,false,false,false,false,,false,false,2019-08-14T13:53:05.000Z,0 CVE-2019-0322,https://securityvulnerability.io/vulnerability/CVE-2019-0322,,"SAP Commerce Cloud (previously known as SAP Hybris Commerce), (HY_COM, versions 6.3, 6.4, 6.5, 6.6, 6.7, 1808, 1811), allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service.",SAP,SAP Commerce Cloud (ex SAP Hybris Commerce) (hy Com),7.5,HIGH,0.004040000028908253,false,false,false,false,,false,false,2019-07-10T19:00:32.000Z,0