First published: Thu Apr 07 2016(Updated: )
The chat feature in the Real-Time Collaboration (RTC) services 7.3 and 7.4 in SAP NetWeaver Java AS 7.1 through 7.5 allows remote attackers to obtain sensitive user information by visiting webdynpro/resources/sap.com/tc~rtc~coll.appl.rtc~wd_chat/Chat#, pressing "Add users", and doing a search, aka SAP Security Note 2255990.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Java Application Server | >=7.10<=7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3973 is considered a medium severity vulnerability due to its information disclosure risk.
To fix CVE-2016-3973, it is advised to upgrade to a patched version of SAP NetWeaver Java AS that eliminates this vulnerability.
CVE-2016-3973 is classified as an information disclosure vulnerability affecting the chat feature in SAP NetWeaver Java AS.
CVE-2016-3973 affects SAP NetWeaver Java AS versions 7.1 through 7.5.
Attackers exploiting CVE-2016-3973 can obtain sensitive user information through the missing access controls in the chat feature.