Advisory
On 10.05.2022 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within UI5.
SAP Note 2756188 addresses "Cross-Site Request Forgery (CSRF) vulnerability in F0673 Approve Bank Payments front-end" to prevent cross-site request forgery (xsrf) with a medium risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process, the team suggests.
Risk specification
F0673 Approve Bank Payments allows an attacker to trick an authenticated user to send an unintended request to the webserver. This vulnerability is due to insufficient CSRF protection.Solution
HTTP method changed from GET to POST.
The advisory is valid for
- UIAPFI70 300
- UIAPFI70 400
- 9.9 [CVE-2022-41267] Server-Side Request Forgery vulnerability in SAP BusinessObjects Business Intelligence Platform
- 8.2 [CVE-2022-27671] CSRF token visible in one of the URL in SAP Business Intelligence Platform.
- 6.3 Cross-Site Request Forgery (CSRF) vulnerability in F0673 Approve Bank Payments back-end
- 5.0 [CVE-2022-29612] Server-Side Request Forgery in SAP NetWeaver, ABAP Platform and SAP Host Agent