Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 3477196
was released on
13.08.2024 and deals with
"[CVE-2024-29415] Server-Side Request Forgery vulnerability in applications built with SAP Build Apps" within SAP Build Apps.
We advice you to follow the instructions, to resolve
server-side request forgery (ssrf)
with a
hot news potential for exploitation
in component CA-LCA-ACP.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as project.
Risk specification
Apps created with SAP Build apps allow an unauthenticated attacker to send crafted requests from an exposed web application to other systems resulting in a possible loss or change of data.Solution
The vulnerable dependency was updated to the newer version that is no longer vulnerability to this kind of attack.
- 8.1 [CVE-2021-33705] Server-Side Request Forgery (SSRF) vulnerability in SAP NetWeaver Enterprise Portal
- 5.8 [CVE-2020-6282] Server-Side Request Forgery in SAP NetWeaver AS JAVA (IIOP service)
- 5.0 [CVE-2024-37171] Server-Side Request Forgery (SSRF) in SAP Transportation Management (Collaboration Portal)
- 5.0 [CVE-2024-41737] Server-Side Request Forgery (SSRF) in SAP CRM ABAP (Insights Management)