Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Anchor links are generated with unwanted HTTP href address, SAP security note 1294431

Description

When working in SAP CRM, you can see clearly and copy the fully-qualified URLs of different object links. In some scenarios, some of the links contain session info. If the system is not proper configured, these URLs can be used by other users to whom they have been sent to log into the sender’s session.

Available fix and Supported packages

  • CRMUIF | 510 | 510
  • CRMUIF | 520 | 520
  • CRMUIF | 600 | 600
  • WEBCUIF | 700 | 700
  • WEBCUIF | 730 | 730
  • CRMUIF 510 | SAPK-51008INCRMUIF |
  • CRMUIF 600 | SAPK-60006INCRMUIF |
  • CRMUIF 520 | SAPK-52010INCRMUIF |
  • CRMUIF 600 | SAPK-60015INCRMUIF |
  • WEBCUIF 700 | SAPK-70003INWEBCUIF |
  • WEBCUIF 730 | 730 |

Affected component

    CRM-FRW-UI
    Please use CA-WUI-UI instead

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1294431

TAGS

#Visible-URLs
#Bookmarking-full-URLs
#Sending-URLs

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,