SAP Netweaver 7.4 allows remote authenticated users to bypass an intended Unified Connectivity (UCON) access control list and execute arbitrary Remote Function Modules (RFM) by leveraging a connection created from earlier execution of an anonymous RFM included in a Communication Assembly, aka SAP Security Note 2139366.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2016/Oct/48 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/93501 | |
https://www.onapsis.com/research/security-advisories/sap-ucon-security-protection-bypass | Permissions Required |
http://seclists.org/fulldisclosure/2016/Oct/48 | Mailing List Third Party Advisory |
http://www.securityfocus.com/bid/93501 | |
https://www.onapsis.com/research/security-advisories/sap-ucon-security-protection-bypass | Permissions Required |
Configurations
History
21 Nov 2024, 02:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2016/Oct/48 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/93501 - | |
References | () https://www.onapsis.com/research/security-advisories/sap-ucon-security-protection-bypass - Permissions Required |
Information
Published : 2016-10-13 14:59
Updated : 2024-11-21 02:50
NVD link : CVE-2016-3635
Mitre link : CVE-2016-3635
CVE.ORG link : CVE-2016-3635
JSON object : View
Products Affected
sap
- netweaver
CWE
CWE-284
Improper Access Control