Description
A jsp page in SAP PI- http://<host>:<port>/CPACache/testconfigupload.jsp can be accessed without providing authentication.
Available fix and Supported packages
- MESSAGING | 7.31 | 7.31
- SAP_XIAF | 3.0 | 3.0
- SAP_XIAF | 7.00 | 7.02
- SAP_XIAF | 7.10 | 7.11
- SAP_XIAF | 7.30 | 7.30
- MESSAGING SYSTEM SERVICE 7.10 | SP013 | 000020
- MESSAGING SYSTEM SERVICE 7.10 | SP014 | 000000
- MESSAGING SYSTEM SERVICE 7.11 | SP009 | 000000
- MESSAGING SYSTEM SERVICE 7.30 | SP002 | 000007
- MESSAGING SYSTEM SERVICE 7.30 | SP003 | 000003
- MESSAGING SYSTEM SERVICE 7.30 | SP004 | 000001
- MESSAGING SYSTEM SERVICE 7.30 | SP005 | 000000
- XI ADAPTER FRAMEWORK 3.0 | SP024 | 000011
- XI ADAPTER FRAMEWORK 3.0 | SP025 | 000006
- XI ADAPTER FRAMEWORK 3.0 | SP026 | 000008
- XI ADAPTER FRAMEWORK 3.0 | SP027 | 000005
- XI ADAPTER FRAMEWORK 3.0 | SP028 | 000001
- XI ADAPTER FRAMEWORK 7.00 | SP022 | 000020
- XI ADAPTER FRAMEWORK 7.00 | SP023 | 000010
- XI ADAPTER FRAMEWORK 7.00 | SP024 | 000004
- XI ADAPTER FRAMEWORK 7.00 | SP025 | 000001
- XI ADAPTER FRAMEWORK 7.01 | SP007 | 000009
- XI ADAPTER FRAMEWORK 7.01 | SP008 | 000004
- XI ADAPTER FRAMEWORK 7.01 | SP009 | 000003
- XI ADAPTER FRAMEWORK 7.01 | SP010 | 000001
Affected component
- BC-XI-CON-AFW-DC
Directory Cache
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1600404