Skip links

Cross-Site Request Forgery (CSRF) vulnerability in Dynpro Processing in SAP GUI for HTML, SAP security note 2316723

Description

The Dynpro processing within SAP GUI for HTML allows an attacker to trick an authenticated user to send unintended request to the Web server. This vulnerability is due to insufficient CSRF protection.

Some well-known impacts of CSRF vulnerability are –

  • Attacker could take actions on behalf of an authenticated user
  • Loss of non-repudiation

Available fix and Supported packages

  • KRNL64NUC | 7.42 | 7.42
  • KRNL64NUC | 7.22 | 7.22
  • KRNL64NUC | 7.22EXT | 7.22EXT
  • KRNL64NUC | 7.49 | 7.49
  • KRNL64UC | 7.42 | 7.42
  • KRNL64UC | 7.22 | 7.22
  • KRNL64UC | 7.22EXT | 7.22EXT
  • KRNL64UC | 7.49 | 7.49
  • KERNEL | 7.22 | 7.22
  • KERNEL | 7.42 | 7.42
  • KERNEL | 7.45 | 7.45
  • KERNEL | 7.49 | 7.49
  • SAP KERNEL 7.22 64-BIT | SP210 | 000210
  • SAP KERNEL 7.22 64-BIT UNICODE | SP210 | 000210
  • SAP KERNEL 7.22 EXT 64-BIT | SP210 | 000210
  • SAP KERNEL 7.22 EXT 64-BIT UC | SP210 | 000210
  • SAP KERNEL 7.42 64-BIT | SP424 | 000424
  • SAP KERNEL 7.42 64-BIT | SP430 | 000430
  • SAP KERNEL 7.42 64-BIT UNICODE | SP424 | 000424
  • SAP KERNEL 7.42 64-BIT UNICODE | SP430 | 000430
  • SAP KERNEL 7.45 64-BIT | SP310 | 000310
  • SAP KERNEL 7.45 64-BIT UNICODE | SP310 | 000310
  • SAP KERNEL 7.49 64-BIT UNICODE | SP009 | 000009
  • SAP KERNEL 7.49 64-BIT UNICODE | SP014 | 000014

Affected component

    BC-FES-ITS
    SAP Internet Transaction Server

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/2316723

TAGS

#Open-redirect
#cross-site-redirect
#cross-domain-redirect
#XSRF
#session-riding
SAP-GUI-for-HTML

#WebGUI
#Dynpro