First published: Wed Jun 10 2020(Updated: )
SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server for ABAP | =700 | |
SAP NetWeaver Application Server for ABAP | =701 | |
SAP NetWeaver Application Server for ABAP | =702 | |
SAP NetWeaver Application Server for ABAP | =710 | |
SAP NetWeaver Application Server for ABAP | =711 | |
SAP NetWeaver Application Server for ABAP | =730 | |
SAP NetWeaver Application Server for ABAP | =731 | |
SAP NetWeaver Application Server for ABAP | =740 | |
SAP NetWeaver Application Server for ABAP | =750 | |
SAP NetWeaver Application Server for ABAP | =751 | |
SAP NetWeaver Application Server for ABAP | =752 | |
SAP NetWeaver Application Server for ABAP | =753 | |
SAP NetWeaver Application Server for ABAP | =754 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6275 has been assigned a high severity rating due to the potential for Server Side Request Forgery attacks.
To fix CVE-2020-6275, apply the relevant security patches provided by SAP for your specific version of NetWeaver AS ABAP.
CVE-2020-6275 affects SAP NetWeaver AS ABAP versions 700 through 754.
In the context of CVE-2020-6275, a Server Side Request Forgery attack allows an attacker to exploit inappropriate path names to access unauthorized internal systems.
As of now, there are indications that CVE-2020-6275 is a serious vulnerability, but specific exploits have not been publicly disclosed.