Untrusted XML Document Validation Vulnerability Affects SAP ADS Rendering
CVE-2024-42374

8.2HIGH

Key Information:

Vendor
SAP
Vendor
CVE Published:
13 August 2024

Summary

The BEx Web Java Runtime Export Web Service from SAP exhibits inadequate validation of XML documents received from untrusted sources. This vulnerability enables attackers to extract sensitive information from SAP ADS systems. Additionally, it can lead to the exhaustion of the XMLForm service, resulting in the inaccessibility of PDF creation functionalities, ultimately compromising the confidentiality and availability of applications relying on this service.

Affected Version(s)

SAP BEx Web Java Runtime Export Web Service BI-BASE-E 7.5

SAP BEx Web Java Runtime Export Web Service BI-BASE-B 7.5

SAP BEx Web Java Runtime Export Web Service BI-IBC 7.5

References

CVSS V3.1

Score:
8.2
Severity:
HIGH
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.