Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 3425274
was released on
12.03.2024 and deals with
"[CVE-2019-10744] Code Injection vulnerability in applications built with SAP Build Apps" within SAP Build Apps.
We advice you to follow the instructions, to resolve
code injection
with a
hot news potential for exploitation
in component CA-LCA-ACP.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as project.
Risk specification
The vulnerability CVE-2019-10744 was found in the applications which were built with SAP Build Apps. Due to this vulnerability, attackers can run unauthorized command, which leads to low impact on the confidentiality and high impact on the integrity and availability of the application.Solution
The vulnerability is now eliminated and the attackers can't run unauthorized commands anymore. However the applications must be rebuilt with new corrected version of SAP Build Apps, 4.9.145 or later.
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP Customer Checkout
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP BTP Cloud Foundry
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP HANA XSA
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in XSA Cockpit
- 10.0 [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP Edge Services On Premise Edition