First published: Tue Nov 08 2022(Updated: )
Due to insufficient input validation, SAP NetWeaver Application Server ABAP and ABAP Platform allows an attacker with high level privileges to use a remote enabled function to read a file which is otherwise restricted. On successful exploitation an attacker can completely compromise the confidentiality of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server ABAP | =700 | |
SAP NetWeaver Application Server ABAP | =731 | |
SAP NetWeaver Application Server ABAP | =740 | |
SAP NetWeaver Application Server ABAP | =750 | |
SAP NetWeaver Application Server ABAP | =789 | |
SAP NetWeaver Application Server ABAP | =804 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41212 is a vulnerability in SAP NetWeaver Application Server ABAP and ABAP Platform that allows an attacker with high-level privileges to read a restricted file using a remote enabled function.
CVE-2022-41212 has a severity rating of 4.9 (medium).
Versions 700, 731, 740, 750, 789, and 804 of SAP NetWeaver Application Server ABAP are affected by CVE-2022-41212.
An attacker can exploit CVE-2022-41212 by using a remote enabled function to read a restricted file.
Yes, you can find references for CVE-2022-41212 at the following links: [https://launchpad.support.sap.com/#/notes/3256571](https://launchpad.support.sap.com/#/notes/3256571) and [https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html).