CVE-2024-27898

SAP NetWeaver application, due to insufficient input validation, allows an attacker to send a crafted request from a vulnerable web application targeting internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. Thus, having a low impact on confidentiality.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sap:netweaver:7.5:*:*:*:*:*:*:*

History

06 Feb 2025, 19:01

Type Values Removed Values Added
CPE cpe:2.3:a:sap:netweaver:7.5:*:*:*:*:*:*:*
References () https://me.sap.com/notes/3425188 - () https://me.sap.com/notes/3425188 - Permissions Required
References () https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364 - () https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364 - Vendor Advisory
First Time Sap
Sap netweaver

Information

Published : 2024-04-09 01:15

Updated : 2025-02-06 19:01


NVD link : CVE-2024-27898

Mitre link : CVE-2024-27898

CVE.ORG link : CVE-2024-27898


JSON object : View

Products Affected

sap

  • netweaver
CWE
CWE-918

Server-Side Request Forgery (SSRF)