First published: Tue Aug 13 2024(Updated: )
SAP NetWeaver Application Server ABAP allows an unauthenticated attacker to craft a URL link that could bypass allowlist controls. Depending on the web applications provided by this server, the attacker might inject CSS code or links into the web application that could allow the attacker to read or modify information. There is no impact on availability of application.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server for ABAP | =755 | |
SAP NetWeaver Application Server for ABAP | =756 | |
SAP NetWeaver Application Server for ABAP | =757 | |
SAP NetWeaver Application Server for ABAP | =758 | |
SAP NetWeaver Application Server for ABAP | =sap_basis_700 | |
SAP NetWeaver Application Server for ABAP | =sap_basis_701 | |
SAP NetWeaver Application Server for ABAP | =sap_basis_702 | |
SAP NetWeaver Application Server for ABAP | =sap_basis_731 | |
SAP NetWeaver Application Server for ABAP | =sap_basis_912 | |
SAP NetWeaver Application Server for ABAP | =sap_ui_754 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-41732 is classified as high due to the potential for unauthenticated attackers to exploit the vulnerability.
To fix CVE-2024-41732, apply the latest security patches released by SAP for affected versions of the NetWeaver Application Server ABAP.
CVE-2024-41732 affects SAP NetWeaver Application Server ABAP versions 755, 756, 757, 758, and various SAP Basis versions.
Temporary workarounds for CVE-2024-41732 may include restricting access to the application server and reviewing URL allowlist configurations.
CVE-2024-41732 can enable attacks where an unauthenticated attacker injects CSS code or malicious links into web applications running on the server.