SAP Netweaver 7.4 allows remote authenticated users to bypass an intended Unified Connectivity (UCON) access control list and execute arbitrary Remote Function Modules (RFM) by leveraging a connection created from earlier execution of an anonymous RFM included in a Communication Assembly, aka SAP Security Note 2139366.
References
| Link | Resource |
|---|---|
| http://seclists.org/fulldisclosure/2016/Oct/48 | Mailing List Third Party Advisory |
| http://www.securityfocus.com/bid/93501 | |
| https://www.onapsis.com/research/security-advisories/sap-ucon-security-protection-bypass | Permissions Required |
| http://seclists.org/fulldisclosure/2016/Oct/48 | Mailing List Third Party Advisory |
| http://www.securityfocus.com/bid/93501 | |
| https://www.onapsis.com/research/security-advisories/sap-ucon-security-protection-bypass | Permissions Required |
Configurations
History
21 Nov 2024, 02:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://seclists.org/fulldisclosure/2016/Oct/48 - Mailing List, Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/93501 - | |
| References | () https://www.onapsis.com/research/security-advisories/sap-ucon-security-protection-bypass - Permissions Required |
Information
Published : 2016-10-13 14:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-3635
Mitre link : CVE-2016-3635
CVE.ORG link : CVE-2016-3635
JSON object : View
Products Affected
sap
- netweaver
CWE
CWE-284
Improper Access Control
