First published: Wed Sep 09 2020(Updated: )
A Remote Code Execution vulnerability exists in the SAP NetWeaver (ABAP Server, up to release 7.40) and ABAP Platform (> release 7.40).Because of this, an attacker can exploit these products via Code Injection, and potentially enabling to take complete control of the products, including viewing, changing, or deleting data by injecting code into the working memory which is subsequently executed by the application. It can also be used to cause a general fault in the product, causing the products to terminate.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP ABAP Platform | =700 | |
SAP ABAP Platform | =701 | |
SAP ABAP Platform | =702 | |
SAP ABAP Platform | =710 | |
SAP ABAP Platform | =711 | |
SAP ABAP Platform | =730 | |
SAP ABAP Platform | =731 | |
SAP ABAP Platform | =740 | |
SAP ABAP Platform | =750 | |
SAP ABAP Platform | =751 | |
SAP ABAP Platform | =753 | |
SAP ABAP Platform | =754 | |
SAP ABAP Platform | =755 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this SAP NetWeaver vulnerability is CVE-2020-6318.
The severity level of CVE-2020-6318 is critical.
SAP ABAP Platform versions 700 to 755 are affected by CVE-2020-6318.
An attacker can exploit CVE-2020-6318 via code injection and potentially take complete control of the affected SAP products.
Yes, you can find more information about CVE-2020-6318 in the following references: http://packetstormsecurity.com/files/167229/SAP-Application-Server-ABAP-ABAP-Platform-Code-Injection-SQL-Injection-Missing-Authorization.html, http://seclists.org/fulldisclosure/2022/May/42, and https://launchpad.support.sap.com/#/notes/2958563.