Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

CVE-2019-0319 Content Injection Vulnerability in SAP Gateway, SAP security note 2752614

Description

UPDATE 9th June 2020:This security note has been updated. Correction for the releases 740 and 200 has been provided in the new note 2911267

The SAP Gateway allows an attacker to inject content which is displayed in the form of an error message. An attacker could thus mislead a user to believe this information is from the legitimate service when it’s not.

Available fix and Supported packages

  • SAP_GWFND | 750 | 750
  • SAP_GWFND | 751 | 751
  • SAP_GWFND | 752 | 752
  • SAP_GWFND | 753 | 753
  • SAP_GWFND 750 | SAPK-75015INSAPGWFND |
  • SAP_GWFND 751 | SAPK-75109INSAPGWFND |
  • SAP_GWFND 752 | SAPK-75205INSAPGWFND |
  • SAP_GWFND 753 | SAPK-75303INSAPGWFND |
  • SAP_GWFND 750 | SAPK-75016INSAPGWFND |
  • | SAPK-776BHINSAPBASIS |

Affected component

    OPU-GW-COR
    Framework

CVSS

Score: 4.3
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2752614

TAGS

#OData-V2-and-OData-V4
#&160-augmented-Backus&8211-Naur-form&160-(ABNF)
#&160-CVE-2019-0319

More to explorer

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.