SAP NetWeaver AS Java (CAF - Guided Procedures) - version 7.50, allows an unauthenticated attacker to submit a malicious request with a crafted XML file over the network, which when parsed will enable him to access sensitive files and data but not modify them. There are expansion limits in place so that availability is not affected.
References
Link | Resource |
---|---|
https://me.sap.com/notes/3426111 | Permissions Required |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
https://me.sap.com/notes/3426111 | Permissions Required |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2024-02-13 03:15
Updated : 2024-11-21 08:59
NVD link : CVE-2024-24743
Mitre link : CVE-2024-24743
CVE.ORG link : CVE-2024-24743
JSON object : View
Products Affected
sap
- netweaver_application_server_java
CWE
CWE-611
Improper Restriction of XML External Entity Reference