SAP NetWeaver AS Java Vulnerability Allows Unauthorized Access to Sensitive Data
CVE-2024-24743

8.6HIGH

Key Information:

Vendor
SAP
Vendor
CVE Published:
13 February 2024

Summary

An XML parsing vulnerability exists in SAP NetWeaver AS Java (CAF - Guided Procedures) version 7.50. This vulnerability allows an unauthenticated attacker to send specially crafted XML requests over the network, enabling access to sensitive files and information stored within the system. Although the attacker cannot modify the accessed data, this situation raises concerns over data security and privacy. The system does implement expansion limits to ensure that the availability of the application is not compromised.

Affected Version(s)

SAP NetWeaver AS Java (Guided Procedures) 7.50

References

CVSS V3.1

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.