Skip links

Information Disclosure in SAP ABAP Server, SAP security note 2734580

Description

UPDATE 14th July 2020 : This note has been updated. We have added the note 2091403 as a prerequisite.

UPDATE 9th June 2020: This note has been re-released with updated ‘Correction instruction’ information. Also, changed the validity of the current correction instruction to the same as in note 2189853 and marked it as a prerequisite.

ABAP Server has a weakness in Internet Communication Framework’s logon procedure, which enables a malicious user to steal logon credentials of another user by providing a malicious URL.

Available fix and Supported packages

  • SAP_BASIS | 700 | 702
  • SAP_BASIS | 710 | 711
  • SAP_BASIS | 730 | 730
  • SAP_BASIS | 731 | 731
  • SAP_BASIS | 740 | 740
  • SAP_BASIS | 750 | 754
  • SAP_BASIS 710 | SAPKB71024 |
  • SAP_BASIS 711 | SAPKB71119 |
  • SAP_BASIS 700 | SAPKB70037 |
  • SAP_BASIS 701 | SAPKB70122 |
  • SAP_BASIS 702 | SAPKB70222 |
  • SAP_BASIS 730 | SAPKB73020 |
  • SAP_BASIS 731 | SAPKB73125 |
  • SAP_BASIS 740 | SAPKB74022 |
  • SAP_BASIS 750 | SAPK-75015INSAPBASIS |

Affected component

    BC-MID-ICF-LGN
    ICF System Login

CVSS

Score: 7.4
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/2734580

TAGS

#Request-Forgery
#XSRF