CVE Vulnerabilities

CVE-2020-6275

Server-Side Request Forgery (SSRF)

Published: Jun 10, 2020 | Modified: Oct 05, 2022
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import/export of sessions functionality and coerce the web server into authenticating with the malicious server. Furthermore, if NTLM is setup the attacker can compromise confidentiality, integrity and availability of the SAP database.

Weakness

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Affected Software

Name Vendor Start Version End Version
Netweaver_application_server_abap Sap 700 (including) 700 (including)
Netweaver_application_server_abap Sap 701 (including) 701 (including)
Netweaver_application_server_abap Sap 702 (including) 702 (including)
Netweaver_application_server_abap Sap 710 (including) 710 (including)
Netweaver_application_server_abap Sap 711 (including) 711 (including)
Netweaver_application_server_abap Sap 730 (including) 730 (including)
Netweaver_application_server_abap Sap 731 (including) 731 (including)
Netweaver_application_server_abap Sap 740 (including) 740 (including)
Netweaver_application_server_abap Sap 750 (including) 750 (including)
Netweaver_application_server_abap Sap 751 (including) 751 (including)
Netweaver_application_server_abap Sap 752 (including) 752 (including)
Netweaver_application_server_abap Sap 753 (including) 753 (including)
Netweaver_application_server_abap Sap 754 (including) 754 (including)

References