SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2912939 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=547426775 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-06-10 06:15
Updated : 2022-10-05 07:16
NVD link : CVE-2020-6275
Mitre link : CVE-2020-6275
JSON object : View
CWE
CWE-918
Server-Side Request Forgery (SSRF)
Products Affected
sap
- netweaver_application_server_abap