{ "schema_version": "1.4.0", "id": "GHSA-c47h-mcrh-2p6p", "modified": "2022-05-24T17:14:17Z", "published": "2022-05-24T17:14:17Z", "aliases": [ "CVE-2020-6234" ], "details": "SAP Host Agent, version 7.21, allows an attacker with admin privileges to use the operation framework to gain root privileges over the underlying operating system, leading to Privilege Escalation.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-6234" }, { "type": "WEB", "url": "https://launchpad.support.sap.com/#/notes/2902645" }, { "type": "WEB", "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=544214202" }, { "type": "WEB", "url": "http://packetstormsecurity.com/files/162084/SAP-Host-Control-Local-Privilege-Escalation.html" }, { "type": "WEB", "url": "http://seclists.org/fulldisclosure/2021/Apr/5" } ], "database_specific": { "cwe_ids": [ "CWE-269" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-04-14T19:15:00Z" } }