Description
Web Dynpro ABAP can be used for phishing attacks by allowing an attacker to publish a URL purporting to be from the product, which redirects the victim to a URL chosen by the attacker.
This enables an attacker to falsely gain the trust of a victim and elicit private data from them (such as authentication information).
Available fix and Supported packages
- SAP_UI | 740 | 740
- SAP_BASIS | 700 | 702
- SAP_BASIS | 710 | 711
- SAP_BASIS | 730 | 730
- SAP_BASIS | 731 | 731
- SAP_UI 740 | SAPK-74011INSAPUI |
- SAP_BASIS 731 | SAPKB73115 |
- SAP_BASIS 710 | SAPKB71020 |
- SAP_BASIS 711 | SAPKB71115 |
- SAP_BASIS 700 | SAPKB70033 |
- SAP_BASIS 701 | SAPKB70118 |
- SAP_BASIS 702 | SAPKB70218 |
- SAP_BASIS 730 | SAPKB73014 |
Affected component
- BC-WD-ABA
Web Dynpro ABAP
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/2081029