First published: Tue Jul 09 2024(Updated: )
SAP CRM (WebClient UI Framework) allows an authenticated attacker to enumerate accessible HTTP endpoints in the internal network by specially crafting HTTP requests. On successful exploitation this can result in information disclosure. It has no impact on integrity and availability of the application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Customer Relationship Management S4fnd | =102 | |
Sap Customer Relationship Management S4fnd | =103 | |
Sap Customer Relationship Management S4fnd | =104 | |
Sap Customer Relationship Management S4fnd | =105 | |
Sap Customer Relationship Management S4fnd | =106 | |
Sap Customer Relationship Management S4fnd | =107 | |
Sap Customer Relationship Management S4fnd | =108 | |
Sap Customer Relationship Management Webclient Ui | =701 | |
Sap Customer Relationship Management Webclient Ui | =731 | |
Sap Customer Relationship Management Webclient Ui | =746 | |
Sap Customer Relationship Management Webclient Ui | =747 | |
Sap Customer Relationship Management Webclient Ui | =748 | |
Sap Customer Relationship Management Webclient Ui | =800 | |
Sap Customer Relationship Management Webclient Ui | =801 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-39598 is classified as a moderate severity vulnerability.
To fix CVE-2024-39598, ensure you apply the latest security patches provided by SAP for the affected versions.
Successful exploitation of CVE-2024-39598 can lead to information disclosure by allowing attackers to enumerate accessible HTTP endpoints.
CVE-2024-39598 affects specific versions of SAP Customer Relationship Management S4FND and WebClient UI, including versions 102 through 108 and 701 through 801.
CVE-2024-39598 can be exploited by authenticated attackers who can craft specific HTTP requests.