Advisory
A note with CVSS 5.0 for component BC-CST-STS was released by SAP on 14.06.2022. The correction/advisory 3194674 was described with "[CVE-2022-29612] Server-Side Request Forgery in SAP NetWeaver, ABAP Platform and SAP Host Agent" and affects the system type ABAP SAP Host Agent.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance.
The vulnerability addressed is cross-site request forgery (xsrf) within ABAP SAP Host Agent.
Risk specification
Affected components allow an authenticated attacker to misuse a function of the sapcontrol web functionality (startservice) in the Kernel and provoking an error resulting in retrieval of technical information.Solution
Every caller of this functionality will be blocked except for releases 7.22, 7.49 and 7.53 where SAP Host Agent is accepted as a legitimate caller.
The advisory is valid for
- KERNEL 7.22 24
- KERNEL 7.49 23
- KERNEL 7.53 36
- KERNEL 7.77 34
- KERNEL 7.81 24
- KERNEL 7.85 25
- KERNEL 7.86 10
- KERNEL 7.87 7
- KERNEL 7.88 5
- KERNEL 8.04 11
- KRNL64NUC 7.22 30
- KRNL64NUC 7.22EXT 30
- KRNL64NUC 7.49 24
- KRNL64UC 7.22 30
- KRNL64UC 7.22EXT 30
- KRNL64UC 7.49 24
- KRNL64UC 7.53 36
- KRNL64UC 8.04 12
- SAPHOSTAGENT 7.22 11
- 9.9 [CVE-2022-41267] Server-Side Request Forgery vulnerability in SAP BusinessObjects Business Intelligence Platform
- 8.2 [CVE-2022-27671] CSRF token visible in one of the URL in SAP Business Intelligence Platform.
- 6.3 Cross-Site Request Forgery (CSRF) vulnerability in F0673 Approve Bank Payments back-end
- 6.3 Cross-Site Request Forgery (CSRF) vulnerability in F0673 Approve Bank Payments front-end