Skip links

Information disclosure relating to server info, SAP security note 1471118

Description

A malicious user can discover information relating to the SAP Java Web Application Server(WAS). The information accidently disclosed above is only a dummy value and hence doesn’t have any major impact.

Available fix and Supported packages

  • SAP_JTECHF | 7.00 | 7.02
  • SAP_JTECHF | 6.40 | 6.40
  • WD-RUNTIME | 7.10 | 7.11
  • WD-RUNTIME | 7.20 | 7.20
  • WD-RUNTIME | 7.30 | 7.30
  • SAP TECH S 6.40 OFFLINE | SP027 | 000000
  • SAP TECH S 7.00 OFFLINE | SP023 | 000000
  • SAP TECH S OFFLINE 7.01 | SP008 | 000000
  • SAP TECH S OFFLINE 7.02 | SP005 | 000000
  • WEB DYNPRO RUNTIME 7.10 | SP011 | 000000
  • WEB DYNPRO RUNTIME 7.11 | SP006 | 000000
  • WEB DYNPRO RUNTIME 7.20 | SP004 | 000000

Affected component

    BC-WD-JAV
    WebDynpro Java

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1471118

TAGS

#Information-disclosure
#Web-Dynpro
#wdResMod.bat
#SDM.

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies