First published: Tue Aug 13 2024(Updated: )
SAP NetWeaver Application Server ABAP allows an unauthenticated attacker to craft a URL link that could bypass allowlist controls. Depending on the web applications provided by this server, the attacker might inject CSS code or links into the web application that could allow the attacker to read or modify information. There is no impact on availability of application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server ABAP | =755 | |
SAP NetWeaver Application Server ABAP | =756 | |
SAP NetWeaver Application Server ABAP | =757 | |
SAP NetWeaver Application Server ABAP | =758 | |
SAP NetWeaver Application Server ABAP | =sap_basis_700 | |
SAP NetWeaver Application Server ABAP | =sap_basis_701 | |
SAP NetWeaver Application Server ABAP | =sap_basis_702 | |
SAP NetWeaver Application Server ABAP | =sap_basis_731 | |
SAP NetWeaver Application Server ABAP | =sap_basis_912 | |
SAP NetWeaver Application Server ABAP | =sap_ui_754 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.