First published: Tue Aug 13 2024(Updated: )
SAP shared service framework allows an authenticated non-administrative user to call a remote-enabled function, which will allow them to insert value entries into a non-sensitive table, causing low impact on integrity of the application
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Shared Service Framework | =sap_bs_fnd_702 | |
SAP Shared Service Framework | =sap_bs_fnd_731 | |
SAP Shared Service Framework | =sap_bs_fnd_746 | |
SAP Shared Service Framework | =sap_bs_fnd_747 | |
SAP Shared Service Framework | =sap_bs_fnd_748 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42377 has a low severity impact on the integrity of the application.
To mitigate CVE-2024-42377, ensure that proper authorization checks are implemented for remote-enabled function calls.
CVE-2024-42377 affects users of multiple versions of the SAP Shared Service Framework including sap_bs_fnd_702, sap_bs_fnd_731, sap_bs_fnd_746, sap_bs_fnd_747, and sap_bs_fnd_748.
Users may be able to insert unauthorized value entries into a non-sensitive table, potentially impacting application integrity.
No, CVE-2024-42377 requires an authenticated non-administrative user to exploit the vulnerability.