Description
UPDATE 14th July 2020 : This note has been updated. We have added the note 2091403 as a prerequisite.
UPDATE 9th June 2020: This note has been re-released with updated ‘Correction instruction’ information. Also, changed the validity of the current correction instruction to the same as in note 2189853 and marked it as a prerequisite.
ABAP Server has a weakness in Internet Communication Framework’s logon procedure, which enables a malicious user to steal logon credentials of another user by providing a malicious URL.
Available fix and Supported packages
- SAP_BASIS | 700 | 702
- SAP_BASIS | 710 | 711
- SAP_BASIS | 730 | 730
- SAP_BASIS | 731 | 731
- SAP_BASIS | 740 | 740
- SAP_BASIS | 750 | 754
- SAP_BASIS 710 | SAPKB71024 |
- SAP_BASIS 711 | SAPKB71119 |
- SAP_BASIS 700 | SAPKB70037 |
- SAP_BASIS 701 | SAPKB70122 |
- SAP_BASIS 702 | SAPKB70222 |
- SAP_BASIS 730 | SAPKB73020 |
- SAP_BASIS 731 | SAPKB73125 |
- SAP_BASIS 740 | SAPKB74022 |
- SAP_BASIS 750 | SAPK-75015INSAPBASIS |
Affected component
- BC-MID-ICF-LGN
ICF System Login
CVSS
Score: 7.4
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/2734580