Multiple vulnerabilities have been reported, which could be exploited by an attacker to disclose sensitive information, gain elevated privileges, bypass security restrictions, perform Cross-Site Scripting (XSS) and injection attacks, execute arbitrary code, manipulate user sessions, access unauthorized files, and cause a denial-of-service condition on the targeted system.
Target Audience:
SAP system administrators, SAP security teams, IT infrastructure teams managing SAP landscape and Application developers using affected SAP.
Risk Assessment:
Potential for data loss, unauthorized access to sensitive files, privilege escalation, manipulation of user sessions, and service unavailability.
Impact Assessment:
High risk of data theft, system compromise, privilege abuse, and prolonged service disruptions.
The information provided herein is on "as is" basis, without warranty of any kind.