Skip links

Cross-Site Request Forgery (CSRF) vulnerability in SAP Web Dynpro ABAP, SAP security note 2747062

Description

UPDATE 28th July 2020 : This note has been re-released. Correction instructions for SAP_BASIS releases got adjusted.

Web Dynpro ABAP allows an attacker to trick an authenticated user to send unintended requests to the web server. This vulnerability is due to insufficient CSRF protection.

Some well-known impacts of CSRF vulnerability are –

  • Attacker could take actions on behalf of an authenticated user
  • Loss of non-repudiation

Available fix and Supported packages

  • SAP_UI | 750 | 750
  • SAP_UI | 751 | 751
  • SAP_UI | 752 | 752
  • SAP_UI | 753 | 753
  • SAP_BASIS | 700 | 702
  • SAP_BASIS | 710 | 711
  • SAP_BASIS | 730 | 730
  • SAP_BASIS | 731 | 731
  • SAP_BASIS | 804 | 804
  • SAP_BASIS | 776 | 776
  • SAP_UI 750 | SAPK-75015INSAPUI |
  • SAP_UI 751 | SAPK-75110INSAPUI |
  • SAP_UI 752 | SAPK-75207INSAPUI |
  • SAP_UI 753 | SAPK-75304INSAPUI |
  • SAP_UI 750 | SAPK-75016INSAPUI |
  • SAP_BASIS 700 | SAPKB70037 |
  • SAP_BASIS 701 | SAPKB70122 |
  • SAP_BASIS 702 | SAPKB70222 |
  • SAP_BASIS 730 | SAPKB73020 |
  • SAP_BASIS 731 | SAPKB73125 |
  • | SAPK-776BHINSAPBASIS |
  • SAP_BASIS 710 | SAPKB71025 |
  • SAP_BASIS 711 | SAPKB71120 |
  • SAP_BASIS 804 | SAPK-804G2INSAPBASIS |

Affected component

    BC-WD-ABA
    Web Dynpro ABAP

CVSS

Score: 5.0
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/2747062

TAGS

#Open-redirect
#cross-site-redirect
#cross-domain-redirect
#XSRF
#session-riding