First published: Mon Dec 19 2016(Updated: )
Webdynpro in SAP Solman 7.1 through 7.31 allows remote attackers to obtain sensitive information via webdynpro/dispatcher/sap.com/caf~eu~gp~example~timeoff~wd requests, aka SAP Security Note 2344524.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Solution Manager | =7.1 | |
SAP Solution Manager | =7.1-sp10 | |
SAP Solution Manager | =7.1-sp12 | |
SAP Solution Manager | =7.1-sp14 | |
SAP Solution Manager | =7.1-sp5 | |
SAP Solution Manager | =7.20 | |
SAP Solution Manager | =7.20-sp01 | |
SAP Solution Manager | =7.20-sp03 | |
SAP Solution Manager | =7.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10005 is classified as a medium severity vulnerability due to its potential for sensitive information disclosure.
To remediate CVE-2016-10005, apply the patches provided in SAP Security Note 2344524 for the affected versions of SAP Solution Manager.
CVE-2016-10005 affects SAP Solution Manager versions 7.1 through 7.31, including specific support packages.
Yes, CVE-2016-10005 can be exploited remotely, allowing attackers to gain unauthorized access to sensitive information.
Currently, the best approach for CVE-2016-10005 is to update to the patched versions, as no specific workaround is documented.