Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential information disclosure relating to passwords, SAP security note 1501328

Description

A malicious user can discover information relating to passwords in WebDynpro for Java. This information could be used to allow the malicious user to specialise their attacks against passwords.

Available fix and Supported packages

  • SAP-JEE | 6.40 | 6.40
  • SAP_JTECHS | 7.00 | 7.02
  • SAP_JTECHF | 7.00 | 7.02
  • SAP J2EE ENGINE 6.40 | SP024 | 000004
  • SAP J2EE ENGINE 6.40 | SP025 | 000005
  • SAP J2EE ENGINE 6.40 | SP026 | 000002
  • SAP J2EE ENGINE 6.40 | SP027 | 000000
  • SAP JAVA TECH SERVICES 7.00 | SP018 | 000020
  • SAP JAVA TECH SERVICES 7.00 | SP019 | 000021
  • SAP JAVA TECH SERVICES 7.00 | SP020 | 000018
  • SAP JAVA TECH SERVICES 7.00 | SP021 | 000014
  • SAP JAVA TECH SERVICES 7.00 | SP022 | 000006
  • SAP JAVA TECH SERVICES 7.00 | SP023 | 000000
  • SAP JAVA TECH SERVICES 7.01 | SP003 | 000018
  • SAP JAVA TECH SERVICES 7.01 | SP004 | 000025
  • SAP JAVA TECH SERVICES 7.01 | SP005 | 000019
  • SAP JAVA TECH SERVICES 7.01 | SP006 | 000015
  • SAP JAVA TECH SERVICES 7.01 | SP007 | 000004
  • SAP JAVA TECH SERVICES 7.01 | SP008 | 000000
  • SAP JAVA TECH SERVICES 7.02 | SP003 | 000008
  • SAP JAVA TECH SERVICES 7.02 | SP004 | 000005
  • SAP JAVA TECH SERVICES 7.02 | SP005 | 000001
  • SAP JAVA TECH SERVICES 7.02 | SP006 | 000000

Affected component

    BC-WD-JAV
    WebDynpro Java

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1501328

TAGS

#Information-disclosure
#WebDynpro-for-Java.

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,