UPDATE 8th September 2020 :This note has been re-released with updated ‘Solution’ information. We made few minor textual changes in the section mentioned. There have not been any changes done which require customer action.
SAP NetWeaver AS ABAP are vulnerable for SSRF(Server Side Request Forgery) where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database.
Available fix and Supported packages
- SAP_BASIS | 700 | 702
- SAP_BASIS | 710 | 711
- SAP_BASIS | 730 | 730
- SAP_BASIS | 731 | 731
- SAP_BASIS | 740 | 740
- SAP_BASIS | 750 | 754
- SAP_BASIS 700 | SAPKB70038 |
- SAP_BASIS 701 | SAPKB70123 |
- SAP_BASIS 702 | SAPKB70223 |
- SAP_BASIS 730 | SAPKB73021 |
- SAP_BASIS 731 | SAPKB73127 |
- SAP_BASIS 740 | SAPKB74024 |
- SAP_BASIS 751 | SAPK-75111INSAPBASIS |
- SAP_BASIS 752 | SAPK-75207INSAPBASIS |
- SAP_BASIS 753 | SAPK-75305INSAPBASIS |
- SAP_BASIS 754 | SAPK-75403INSAPBASIS |
- SAP_BASIS 750 | SAPK-75019INSAPBASIS |
Dynpro and CUA engine
Exploit is not available.
For detailed information please contact the mail [email protected]