CVE-2024-34686

6.1 MEDIUM

📋 TL;DR

This is a cross-site scripting (XSS) vulnerability in SAP CRM WebClient UI that allows unauthenticated attackers to craft malicious URLs containing scripts. When victims click these links, the scripts execute in their browsers, potentially allowing attackers to access or modify information. All users of affected SAP CRM WebClient UI versions are vulnerable.

💻 Affected Systems

Products:
  • SAP CRM WebClient UI
Versions: Specific versions not detailed in CVE; refer to SAP Note 3465129 for affected versions
Operating Systems: All platforms running SAP CRM WebClient UI
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the WebClient UI component; requires SAP CRM deployment with WebClient UI enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, perform actions as authenticated users, redirect to malicious sites, or capture sensitive data entered in the CRM interface.

🟠

Likely Case

Attackers would typically use this for session hijacking, credential theft, or phishing attacks against CRM users.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be neutralized before execution.

🌐 Internet-Facing: HIGH - Since exploitation requires only a crafted URL, internet-facing instances are particularly vulnerable to drive-by attacks.
🏢 Internal Only: MEDIUM - Internal users could still be targeted via phishing emails or malicious links within the organization.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only crafting a malicious URL and social engineering victims to click it; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3465129

Vendor Advisory: https://me.sap.com/notes/3465129

Restart Required: Yes

Instructions:

1. Download SAP Note 3465129 from SAP Support Portal. 2. Apply the note to affected SAP CRM systems. 3. Restart the application server. 4. Test the fix in a development environment first.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation for URL parameters in WebClient UI

Custom ABAP code required; implement input validation in relevant WebClient UI handlers

Content Security Policy

all

Implement CSP headers to restrict script execution

Configure SAP Web Dispatcher or application server to add CSP headers

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block malicious URLs containing script patterns
  • Educate users about phishing risks and safe browsing practices for CRM access

🔍 How to Verify

Check if Vulnerable:

Check if SAP Security Note 3465129 is applied in transaction SNOTE

Check Version:

Transaction SM51 to check application server details; or check note implementation in SNOTE

Verify Fix Applied:

Test with crafted URLs containing script payloads; they should be properly sanitized or blocked

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL patterns with script tags in WebClient UI access logs
  • Multiple failed script execution attempts

Network Indicators:

  • HTTP requests with suspicious parameters containing script elements to CRM endpoints

SIEM Query:

web.url CONTAINS "<script>" AND destination_ip IN (crm_server_ips)

🔗 References

📤 Share & Export