First published: Tue Jul 09 2024(Updated: )
WebFlow Services of SAP Business Workflow allows an authenticated attacker to enumerate accessible HTTP endpoints in the internal network by specially crafting HTTP requests. On successful exploitation this can result in information disclosure. It has no impact on integrity and availability of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Business Workflow | ||
SAP Basis | =700 | |
SAP Basis | =701 | |
SAP Basis | =702 | |
SAP Basis | =731 | |
SAP Basis | =740 | |
SAP Basis | =750 | |
SAP Basis | =751 | |
SAP Basis | =752 | |
SAP Basis | =753 | |
SAP Basis | =754 | |
SAP Basis | =755 | |
SAP Basis | =756 | |
SAP Basis | =757 | |
SAP Basis | =758 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34689 is classified as a medium severity vulnerability.
To fix CVE-2024-34689, update your SAP Business Workflow to the latest patched version from SAP.
CVE-2024-34689 allows authenticated attackers to enumerate HTTP endpoints, potentially leading to information disclosure.
CVE-2024-34689 affects various versions of SAP Business Workflow and SAP Basis, specifically from versions 700 to 758.
CVE-2024-34689 does not impact the integrity or availability of the system, only the confidentiality of information.