Description
Web Dynpro for Java can be abused by a malicious user, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users.
Available fix and Supported packages
- SAP_JTECHS | 7.01 | 7.02
- SAP_JTECHF | 7.01 | 7.02
- WD-RUNTIME | 7.10 | 7.11
- WD-RUNTIME | 7.20 | 7.20
- FRAMEWORK | 7.10 | 7.11
- FRAMEWORK | 7.20 | 7.20
- SAP JAVA TECH SERVICES 7.01 | SP006 | 000028
- SAP JAVA TECH SERVICES 7.01 | SP007 | 000018
- SAP JAVA TECH SERVICES 7.01 | SP008 | 000011
- SAP JAVA TECH SERVICES 7.01 | SP010 | 000001
- SAP JAVA TECH SERVICES 7.01 | SP011 | 000000
- SAP JAVA TECH SERVICES 7.02 | SP003 | 000019
- SAP JAVA TECH SERVICES 7.02 | SP004 | 000020
- SAP JAVA TECH SERVICES 7.02 | SP005 | 000013
- SAP JAVA TECH SERVICES 7.02 | SP006 | 000012
- SAP JAVA TECH SERVICES 7.02 | SP007 | 000012
- SAP JAVA TECH SERVICES 7.02 | SP008 | 000002
- SAP JAVA TECH SERVICES 7.02 | SP009 | 000001
- SAP JAVA TECH SERVICES 7.02 | SP010 | 000000
- SAP TECH S OFFLINE 7.01 | SP007 | 000010
- SAP TECH S OFFLINE 7.01 | SP008 | 000004
- SAP TECH S OFFLINE 7.01 | SP009 | 000003
- SAP TECH S OFFLINE 7.01 | SP010 | 000001
- SAP TECH S OFFLINE 7.01 | SP011 | 000000
- SAP TECH S OFFLINE 7.02 | SP010 | 000000
- WEB DYNPRO RUNTIME 7.10 | SP010 | 000008
Affected component
- BC-WD-JAV
WebDynpro Java
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1608569