First published: Tue Dec 12 2017(Updated: )
URL redirection vulnerability in SAP's Startup Service, SAP KERNEL 32 NUC, SAP KERNEL 32 Unicode, SAP KERNEL 64 NUC, SAP KERNEL 64 Unicode 7.21, 7.21EXT, 7.22 and 7.22EXT; SAP KERNEL 7.21, 7.22, 7.45, 7.49 and 7.52, that allows an attacker to redirect users to a malicious site.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Kernel | =7.21 | |
SAP Kernel | =7.21ext | |
SAP Kernel | =7.22 | |
SAP Kernel | =7.22ext | |
SAP Kernel | =7.45 | |
SAP Kernel | =7.49 | |
SAP Kernel | =7.52 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-16679 has a high severity rating due to its potential to allow an attacker to redirect users to malicious sites.
To fix CVE-2017-16679, apply the latest security patches provided by SAP for the affected versions of the SAP Kernel.
CVE-2017-16679 affects SAP Kernel versions 7.21, 7.21EXT, 7.22, 7.22EXT, 7.45, 7.49, and 7.52.
CVE-2017-16679 is classified as a URL redirection vulnerability.
Yes, CVE-2017-16679 can be exploited remotely as it allows redirection to malicious websites without user interaction.