Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Unauthorized usage of application functionality in SAP Exchange Infrastructure, SAP security note 2181460

Description

An attacker can remotely exploit Integration Builder Directory, rendering it, and potentially consume the resources that are used to serve PI.

As a side effect of a security fix there might be cache refresh problems. In sxi_cache you might see following error:
“Error ‘HTTP status code 403  Forbidden’ while executing HTTP request (calling method ‘get_status’)” 

Available fix and Supported packages

  • SAP_BASIS | 700 | 702
  • SAP_BASIS | 710 | 711
  • SAP_BASIS | 730 | 730
  • SAP_BASIS | 731 | 731
  • SAP_BASIS | 740 | 740
  • SAP_BASIS 710 | SAPKB71020 |
  • SAP_BASIS 711 | SAPKB71115 |
  • SAP_BASIS 700 | SAPKB70033 |
  • SAP_BASIS 701 | SAPKB70118 |
  • SAP_BASIS 702 | SAPKB70218 |
  • SAP_BASIS 730 | SAPKB73014 |
  • SAP_BASIS 731 | SAPKB73117 |
  • SAP_BASIS 740 | SAPKB74013 |

Affected component

    BC-XI-IBC
    Integration Builder – Configuration

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2181460

TAGS

#sxi_cache
#&160-XSRF
#SAP-Exchange-Infrastructure
#&160-Integration-Builder-Directory
#ABAP-client

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,