SB2025011427 - Multiple vulnerabilities in SAP NetWeaver ABAP Server and ABAP Platform
Published: January 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Information disclosure (CVE-ID: CVE-2025-0053)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote non-authenticated attacker can gain unauthorized access to sensitive information on the system.
2) Missing authorization (CVE-ID: CVE-2025-0068)
The vulnerability allows a remote user to escalate privileges within he application.
The vulnerability exists due to missing authorization in remote function call (RFC). A remote privileged user can gain unauthorized access to the application.
3) SQL injection (CVE-ID: CVE-2025-0063)
The vulnerability allows a remote user to execute arbitrary SQL queries in database.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, modify data in database and gain complete control over the affected application.
4) Information disclosure (CVE-ID: CVE-2025-0066)
The vulnerability allows a remote user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A remote user can gain obtain sensitive information and use it to elevate privileges within the application.
5) Improper Authentication (CVE-ID: CVE-2025-0070)
The vulnerability allows a remote user to bypass authentication process.
The vulnerability exists due to an error in the authentication process. A remote authenticated user can bypass authentication process and escalate privileges within the application.
Remediation
Install update from vendor's website.