Description
The “Messaging System Monitor” can be abused by a malicious user allowing them to obtain authentication information from other legitimate users.
Available fix and Supported packages
- MESSAGING | 7.10 | 7.11
- MESSAGING | 7.20 | 7.20
- MESSAGING | 7.30 | 7.30
- SAP_XIAF | 3.0 | 3.0
- SAP_XIAF | 7.00 | 7.02
- MESSAGING SYSTEM SERVICE 7.10 | SP005 | 000023
- MESSAGING SYSTEM SERVICE 7.10 | SP006 | 000043
- MESSAGING SYSTEM SERVICE 7.10 | SP007 | 000036
- MESSAGING SYSTEM SERVICE 7.10 | SP008 | 000022
- MESSAGING SYSTEM SERVICE 7.10 | SP009 | 000035
- MESSAGING SYSTEM SERVICE 7.10 | SP010 | 000000
- MESSAGING SYSTEM SERVICE 7.10 | SP011 | 000000
- MESSAGING SYSTEM SERVICE 7.11 | SP001 | 000017
- MESSAGING SYSTEM SERVICE 7.11 | SP002 | 000012
- MESSAGING SYSTEM SERVICE 7.11 | SP003 | 000013
- MESSAGING SYSTEM SERVICE 7.11 | SP004 | 000005
- MESSAGING SYSTEM SERVICE 7.11 | SP005 | 000000
- MESSAGING SYSTEM SERVICE 7.20 | SP001 | 000001
- MESSAGING SYSTEM SERVICE 7.20 | SP002 | 000001
- MESSAGING SYSTEM SERVICE 7.20 | SP003 | 000000
- MESSAGING SYSTEM SERVICE 7.30 | SP000 | 000000
- XI ADAPTER FRAMEWORK 3.0 | SP024 | 000008
- XI ADAPTER FRAMEWORK 3.0 | SP025 | 000002
- XI ADAPTER FRAMEWORK 3.0 | SP026 | 000002
- XI ADAPTER FRAMEWORK 3.0 | SP027 | 000000
Affected component
- BC-XI-CON-MSG
Messaging System
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1443367