SAP Transportation Management (Collaboration Portal) allows an attacker with non-administrative privileges to send a crafted request from a vulnerable web application. This will trigger the application handler to send a request to an unintended service, which may reveal information about that service. The information obtained could be used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability. There is no effect on integrity or availability of the application.
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Saptmui | Sap | 140 (including) | 140 (including) |
Saptmui | Sap | 150 (including) | 150 (including) |
Saptmui | Sap | 160 (including) | 160 (including) |
Saptmui | Sap | 170 (including) | 170 (including) |
Transportation_management | Sap | - (including) | - (including) |