CWE
918
Advisory Published
Updated

CVE-2024-34689: [CVE-2024-34689] Server-Side Request Forgery in SAP Business Workflow (WebFlow Services)

First published: Tue Jul 09 2024(Updated: )

WebFlow Services of SAP Business Workflow allows an authenticated attacker to enumerate accessible HTTP endpoints in the internal network by specially crafting HTTP requests. On successful exploitation this can result in information disclosure. It has no impact on integrity and availability of the application.

Credit: cna@sap.com

Affected SoftwareAffected VersionHow to fix
SAP Business Workflow
Sap Sap Basis=700
Sap Sap Basis=701
Sap Sap Basis=702
Sap Sap Basis=731
Sap Sap Basis=740
Sap Sap Basis=750
Sap Sap Basis=751
Sap Sap Basis=752
Sap Sap Basis=753
Sap Sap Basis=754
Sap Sap Basis=755
Sap Sap Basis=756
Sap Sap Basis=757
Sap Sap Basis=758

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203