Description
UPDATE 28th July 2020 : This note has been re-released. Correction instructions for SAP_BASIS releases got adjusted.
Web Dynpro ABAP allows an attacker to trick an authenticated user to send unintended requests to the web server. This vulnerability is due to insufficient CSRF protection.
Some well-known impacts of CSRF vulnerability are –
- Attacker could take actions on behalf of an authenticated user
- Loss of non-repudiation
Available fix and Supported packages
- SAP_UI | 750 | 750
- SAP_UI | 751 | 751
- SAP_UI | 752 | 752
- SAP_UI | 753 | 753
- SAP_BASIS | 700 | 702
- SAP_BASIS | 710 | 711
- SAP_BASIS | 730 | 730
- SAP_BASIS | 731 | 731
- SAP_BASIS | 804 | 804
- SAP_BASIS | 776 | 776
- SAP_UI 750 | SAPK-75015INSAPUI |
- SAP_UI 751 | SAPK-75110INSAPUI |
- SAP_UI 752 | SAPK-75207INSAPUI |
- SAP_UI 753 | SAPK-75304INSAPUI |
- SAP_UI 750 | SAPK-75016INSAPUI |
- SAP_BASIS 700 | SAPKB70037 |
- SAP_BASIS 701 | SAPKB70122 |
- SAP_BASIS 702 | SAPKB70222 |
- SAP_BASIS 730 | SAPKB73020 |
- SAP_BASIS 731 | SAPKB73125 |
- | SAPK-776BHINSAPBASIS |
- SAP_BASIS 710 | SAPKB71025 |
- SAP_BASIS 711 | SAPKB71120 |
- SAP_BASIS 804 | SAPK-804G2INSAPBASIS |
Affected component
- BC-WD-ABA
Web Dynpro ABAP
CVSS
Score: 5.0
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/2747062