First published: Mon Jan 23 2017(Updated: )
The function msp (aka MSPRuntimeInterface) in the P4 SERVERCORE component in SAP AS JAVA allows remote attackers to obtain sensitive system information by leveraging a missing authorization check for the (1) getInformation, (2) getParameters, (3) getServiceInfo, (4) getStatistic, or (5) getClientStatistic function, aka SAP Security Note 2331908.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5372 has been rated as a medium severity vulnerability due to the potential for information disclosure.
To fix CVE-2017-5372, ensure to apply the latest security patches from SAP for the NetWeaver AS JAVA component.
CVE-2017-5372 can disclose various sensitive system information including service statistics and runtime parameters.
CVE-2017-5372 affects users of SAP NetWeaver AS JAVA who have not implemented necessary access controls.
CVE-2017-5372 can be exploited without authentication due to a missing authorization check.