Multiple vulnerabilities have been reported in SAP products which could allow an attacker to perform Sql injection, cross-site scripting (XSS) attacks, escalate privileges, inject arbitrary code, bypass security restriction, open redirect, disclose sensitive information and perform CSRF (Cross-Site Request Forgery) on the targeted system.
Target Audience:
SAP system administrators, SAP security teams, IT infrastructure teams managing SAP landscape and Application developers using affected SAP.
Risk Assessment:
Privilege escalation, code or command execution, data manipulation or disclosure, authentication bypass, and redirection of users to malicious resources
Impact Assessment:
Execution of arbitrary code or commands, potential for system compromise, Unauthorized access, data exposure, privilege abuse, User redirection facilitating phishing or credential theft, High risk of data breach.
The information provided herein is on "as is" basis, without warranty of any kind.