Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

CVE-2019-0388 Content spoofing vulnerability in UI5 HTTP Handler, SAP security note 2843016


UPDATE 26th January 2021: We made few minor textual changes in the note. There have not been any changes done, which require customer action.

UPDATE 14th January 2020: This note has been re-released with updated “Manual Pre-Implementation Steps” step 6 and “Manual Post-Implementation Steps” step 3 (in releases where available).

UI5 HTTP Handler allows an attacker to manipulate content due to insufficient URL validation. Some well-known impacts of the vulnerability are:

  • phishing attacks to steal credentials of the victim
  • redirect users to untrusted webpages containing malware or similar malicious exploits
  • providing false information to the victim

Available fix and Supported packages

  • SAP_UI | 750 | 750
  • SAP_UI | 751 | 751
  • SAP_UI | 752 | 752
  • SAP_UI | 753 | 753
  • SAP_UI | 754 | 754
  • UI_700 | 200 | 200
  • SAP_UI 750 | SAPK-75016INSAPUI |
  • SAP_UI 753 | SAPK-75305INSAPUI |
  • SAP_UI 754 | SAPK-75401INSAPUI |
  • SAP_UI 751 | SAPK-75112INSAPUI |
  • SAP_UI 752 | SAPK-75209INSAPUI |
  • UI_700 200 | SAPK-20016INUI700 |

Affected component

    UI5 ABAP delivery tools


Score: 4.3


Exploit is not available.
For detailed information please contact the mail [email protected].




More to explorer

SAP Security For All

RedRays Security Platform for Penetration testers and Bug hunters

The product package is specifically created for cyber security experts who have encountered SAP while participating in bug bounty programs.

RedRays Security Platform for SAP Consultants

The product package is designed for SAP consultants conducting security assessments of SAP ERP systems. We provide essential tools and resources to help professionals in this field conduct their work effectively.

RedRays Security Platform for Enterprises

The product package is specifically optimized to cater to the needs of both small/medium and large companies who are seeking to streamline the process of organizing a comprehensive security system for ERP systems.