BEx Web Java Runtime Export Web Service does not
sufficiently validate an XML document accepted from an untrusted source. An
attacker can retrieve information from the SAP ADS system and exhaust the
number of XMLForm service which makes the SAP ADS rendering (PDF creation)
unavailable. This affects the confidentiality and availability of the
application.
References
Link | Resource |
---|---|
https://me.sap.com/notes/3485284 | Permissions Required |
https://url.sap/sapsecuritypatchday | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-08-13 04:15
Updated : 2024-09-16 16:25
NVD link : CVE-2024-42374
Mitre link : CVE-2024-42374
CVE.ORG link : CVE-2024-42374
JSON object : View
Products Affected
sap
- bex_web_java_runtime_export_web_service
CWE
CWE-91
XML Injection (aka Blind XPath Injection)