Skip links

Unauthorized usage of application functionality in SAP Exchange Infrastructure, SAP security note 2181460

Description

An attacker can remotely exploit Integration Builder Directory, rendering it, and potentially consume the resources that are used to serve PI.

As a side effect of a security fix there might be cache refresh problems. In sxi_cache you might see following error:
“Error ‘HTTP status code 403  Forbidden’ while executing HTTP request (calling method ‘get_status’)” 

Available fix and Supported packages

  • SAP_BASIS | 700 | 702
  • SAP_BASIS | 710 | 711
  • SAP_BASIS | 730 | 730
  • SAP_BASIS | 731 | 731
  • SAP_BASIS | 740 | 740
  • SAP_BASIS 710 | SAPKB71020 |
  • SAP_BASIS 711 | SAPKB71115 |
  • SAP_BASIS 700 | SAPKB70033 |
  • SAP_BASIS 701 | SAPKB70118 |
  • SAP_BASIS 702 | SAPKB70218 |
  • SAP_BASIS 730 | SAPKB73014 |
  • SAP_BASIS 731 | SAPKB73117 |
  • SAP_BASIS 740 | SAPKB74013 |

Affected component

    BC-XI-IBC
    Integration Builder – Configuration

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2181460

TAGS

#sxi_cache
#&160-XSRF
#SAP-Exchange-Infrastructure
#&160-Integration-Builder-Directory
#ABAP-client

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies