First published: Tue Jul 09 2024(Updated: )
SAP Transportation Management (Collaboration Portal) allows an attacker with non-administrative privileges to send a crafted request from a vulnerable web application. This will trigger the application handler to send a request to an unintended service, which may reveal information about that service. The information obtained could be used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. There is no effect on integrity or availability of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Saptmui | =140 | |
Sap Saptmui | =150 | |
Sap Saptmui | =160 | |
Sap Saptmui | =170 | |
SAP Transportation Management |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37171 is classified with a medium severity level due to its potential to expose sensitive information.
To fix CVE-2024-37171, ensure that you apply the latest security patches recommended by SAP for affected versions.
CVE-2024-37171 affects SAP Transportation Management versions 140, 150, 160, 170 as well as SAP Saptmui.
CVE-2024-37171 is associated with an attack that allows unauthorized users to send crafted requests to unintended services.
CVE-2024-37171 may potentially reveal sensitive information from the vulnerable SAP applications.