First published: Tue Dec 12 2017(Updated: )
Server Side Request Forgery (SSRF) vulnerability in SAP NetWeaver Knowledge Management Configuration Service, EPBC and EPBC2 from 7.00 to 7.02; KMC-BC 7.30, 7.31, 7.40 and 7.50, that allows an attacker to manipulate the vulnerable application to send crafted requests on behalf of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Knowledge Management | ||
SAP Enterprise Performance Management Cloud | >=7.00<=7.02 | |
SAP Enterprise Performance Management (EPM) | >=7.00<=7.02 | |
SAP KMC-BC | =7.30 | |
SAP KMC-BC | =7.31 | |
SAP KMC-BC | =7.40 | |
SAP KMC-BC | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16678 is classified as a medium severity vulnerability due to its potential for Server Side Request Forgery (SSRF) attacks.
To fix CVE-2017-16678, it is recommended to apply the latest security patches provided by SAP for the affected versions of their software.
CVE-2017-16678 affects SAP NetWeaver Knowledge Management Configuration Service, EPBC, EPBC2, and various versions of KMC-BC.
Using CVE-2017-16678, an attacker can execute Server Side Request Forgery (SSRF) attacks to send crafted requests on behalf of the vulnerable application.
CVE-2017-16678 was disclosed in December 2017 during SAP's security patch day.