Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Unauthorized usage of functionality in Web Dynpro for Java, SAP security note 1327872

Description

A malicious user can trigger functionality in Web Dynpro for Java without authentication and authorization.

Available fix and Supported packages

  • SAP_JTECHS | 7.00 | 7.02
  • SAP_JTECHF | 7.00 | 7.02
  • WD-RUNTIME | 7.10 | 7.11
  • WD-RUNTIME | 7.20 | 7.20
  • WD-RUNTIME | 7.30 | 7.30
  • SAP JAVA TECH SERVICES 7.00 | SP022 | 000000
  • SAP JAVA TECH SERVICES 7.01 | SP007 | 000000
  • SAP JAVA TECH SERVICES 7.02 | SP003 | 000000
  • SAP TECH S 7.00 OFFLINE | SP022 | 000000
  • SAP TECH S OFFLINE 7.01 | SP007 | 000000
  • SAP TECH S OFFLINE 7.02 | SP003 | 000000
  • WEB DYNPRO RUNTIME 7.20 | SP004 | 000000

Affected component

    BC-WD-JAV
    WebDynpro Java

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1327872

TAGS

#Cross-Site-Request-Forgery
#XSRF
#Web-Dynpro-for-Java

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,