CVE-2023-26459

7.4 HIGH

📋 TL;DR

This vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform allows authenticated non-administrative users to craft requests that trigger the application server to send requests to arbitrary URLs. This can lead to unauthorized access, modification, or disruption of non-sensitive information, affecting organizations running vulnerable SAP systems.

💻 Affected Systems

Products:
  • SAP NetWeaver AS for ABAP
  • SAP ABAP Platform
Versions: 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791
Operating Systems: All platforms running SAP NetWeaver
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations of listed versions; requires authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could redirect application server requests to malicious endpoints, potentially leading to data exfiltration, service disruption, or manipulation of internal systems through server-side request forgery.

🟠

Likely Case

Authenticated users could abuse this to access internal resources, perform reconnaissance, or cause limited service degradation by overwhelming systems with crafted requests.

🟢

If Mitigated

With proper network segmentation and authentication controls, impact is limited to internal network resources accessible from the SAP server.

🌐 Internet-Facing: MEDIUM - While exploitation requires authentication, internet-facing SAP systems could be targeted by attackers who obtain valid credentials.
🏢 Internal Only: HIGH - Internal attackers with valid credentials could exploit this to pivot within the network and access internal resources.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3296346

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3296346

Restart Required: Yes

Instructions:

1. Download SAP Note 3296346 from SAP Support Portal. 2. Apply the correction instructions provided in the note. 3. Restart the SAP system to activate the fix.

🔧 Temporary Workarounds

Restrict Network Access

all

Implement network controls to limit outbound connections from SAP servers to only necessary destinations.

Enforce Least Privilege

all

Review and restrict user permissions to minimize the number of users who could potentially exploit this vulnerability.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP systems from sensitive internal resources
  • Enhance monitoring for unusual outbound connections from SAP application servers

🔍 How to Verify

Check if Vulnerable:

Check if your SAP system version is in the affected range and if SAP Note 3296346 has not been applied.

Check Version:

Execute transaction SM51 or check system information in SAP GUI

Verify Fix Applied:

Verify that SAP Note 3296346 is listed as implemented in transaction SNOTE or by checking the applied notes in system administration.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from SAP application servers
  • Multiple failed authentication attempts followed by successful logins

Network Indicators:

  • Unexpected outbound connections from SAP servers to unusual destinations
  • HTTP requests with crafted URLs originating from SAP systems

SIEM Query:

source="sap_server" AND (http_request OR url_contains) AND destination_ip NOT IN [allowed_ips]

🔗 References

📤 Share & Export