First published: Tue Sep 11 2018(Updated: )
In certain cases, BEx Web Java Runtime Export Web Service in SAP NetWeaver BI 7.30, 7.31. 7.40, 7.41, 7.50, does not sufficiently validate an XML document accepted from an untrusted source.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver | =7.30 | |
SAP NetWeaver | =7.31 | |
SAP NetWeaver | =7.40 | |
SAP NetWeaver | =7.41 | |
SAP NetWeaver | =7.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-2462 is a vulnerability in the BEx Web Java Runtime Export Web Service in SAP NetWeaver BI.
The severity of CVE-2018-2462 is high with a CVSS score of 8.8.
SAP NetWeaver BI 7.30, 7.31, 7.40, 7.41, and 7.50 are affected by CVE-2018-2462.
CVE-2018-2462 allows an attacker to execute arbitrary code on the affected system if a malicious XML document is accepted from an untrusted source.
To fix CVE-2018-2462, apply the necessary security patches provided by SAP and ensure that XML documents are only accepted from trusted sources.