Multiple vulnerabilities have been reported in SAP products, which could be exploited by an attacker to gain elevated privileges, bypass security restrictions, inject HTML code, traverse directories, execute arbitrary code, disclose sensitive information, perform Server-Side Request Forgery & Cross-Site Scripting (XSS) attacks and cause denial of service condition on the targeted system.
Target Audience:
SAP system administrators, SAP security teams, IT infrastructure teams managing SAP landscape and Application developers using affected SAP.
Risk Assessment:
Potential for data loss, compromise of sensitive information and service unavailability.
Impact Assessment:
High risk of data theft, service disruptions and system compromise.
The information provided herein is on "as is" basis, without warranty of any kind.