SAP Business Client, version 7.0, allows an attacker after a successful social engineering attack to inject malicious code as a DLL file in untrusted directories that can be executed by the application, due to uncontrolled search path element. An attacker could thereby control the behavior of the application.
History

Tue, 27 May 2025 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:sap:business_client:7.0:*:*:*:*:*:*:* cpe:2.3:a:sap:business_client:6.0:-:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level10:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level11:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level12:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level13:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level14:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level15:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level16:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level17:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level1:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level2:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level3:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level4:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level5:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level6:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level7:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level8:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.0:patch_level9:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:-:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level10:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level11:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level12:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level13:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level14:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level15:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level16:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level17:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level18:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level19:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level1:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level20:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level21:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level22:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level2:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level3:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level4:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level5:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level6:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level7:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level8:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:6.5:patch_level9:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:7.0:-:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:7.0:patch_level1:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:7.0:patch_level2:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:7.0:patch_level3:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:7.0:patch_level4:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:7.0:patch_level5:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:7.0:patch_level6:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:7.0:patch_level7:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:7.0:patch_level8:*:*:*:*:*:*
cpe:2.3:a:sap:business_client:7.0:patch_level9:*:*:*:*:*:*

cve-icon MITRE

Status: PUBLISHED

Assigner: sap

Published: 2020-05-12T17:54:36

Updated: 2024-08-04T08:55:22.319Z

Reserved: 2020-01-08T00:00:00

Link: CVE-2020-6244

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2020-05-12T18:15:13.973

Modified: 2025-05-27T16:50:33.953

Link: CVE-2020-6244

cve-icon Redhat

No data.