Skip links

Unchecked parameters can lead to unauthorized modification, SAP security note 1624284

Description

ep.runtime.navigation component receives string parameters from the client-side. They can be abused by malicious users, allowing them to write unauthorized data.

Available fix and Supported packages

  • EP-RUNTIME | 7.20 | 7.20
  • EP-RUNTIME | 7.30 | 7.30
  • EP-RUNTIME | 7.31 | 7.31
  • EP RUNTIME 7.20 | SP005 | 000005
  • EP RUNTIME 7.20 | SP006 | 000001
  • EP RUNTIME 7.20 | SP007 | 000000
  • EP RUNTIME 7.30 | SP001 | 000001
  • EP RUNTIME 7.30 | SP002 | 000006
  • EP RUNTIME 7.30 | SP003 | 000009
  • EP RUNTIME 7.30 | SP004 | 000004
  • EP RUNTIME 7.30 | SP005 | 000001
  • EP RUNTIME 7.30 | SP006 | 000000
  • EP RUNTIME 7.30 | SP007 | 000000
  • EP RUNTIME 7.31 | SP001 | 000000
  • EP RUNTIME 7.31 | SP002 | 000000

Affected component

    EP-PIN-NAV-SRV
    Use EP-PIN-NAV

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1624284

TAGS

#Stored-cross-site-scripting
#XSS
#ep.runtime.navigation

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,