CVE-2020-6208
Summary
| CVE | CVE-2020-6208 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-03-10 21:15:00 UTC |
| Updated | 2021-07-21 11:39:00 UTC |
| Description | SAP Business Objects Business Intelligence Platform (Crystal Reports), versions- 4.1, 4.2, allows an attacker with basic authorization to inject code that can be executed by the application and thus allowing the attacker to control the behaviour of the application, leading to Remote Code Execution. Although the mode of attack is only Local, multiple applications can be impacted as a result of the vulnerability. |
Risk And Classification
Problem Types: CWE-416
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Sap | Crystal Reports | 4.1 | All | All | All |
| Application | Sap | Crystal Reports | 4.2 | All | All | All |
| Application | Sap | Crystal Reports | 4.1 | All | All | All |
| Application | Sap | Crystal Reports | 4.2 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| ZDI-20-291 | Zero Day Initiative | MISC | www.zerodayinitiative.com | Third Party Advisory, VDB Entry |
| launchpad.support.sap.com | MISC | launchpad.support.sap.com | Permissions Required |
| SAP Security Patch Day – March 2020 - Product Security Response at SAP - Community Wiki | MISC | wiki.scn.sap.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.