CVE-2024-39591
📋 TL;DR
CVE-2024-39591 is an authorization bypass vulnerability in SAP Document Builder where a specific function module lacks proper authorization checks. This allows authenticated users to escalate privileges and access unauthorized functionality, affecting organizations using vulnerable SAP Document Builder installations.
💻 Affected Systems
- SAP Document Builder
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An authenticated attacker could gain administrative privileges within the SAP Document Builder application, potentially accessing sensitive documents or manipulating document workflows.
Likely Case
An authenticated user with basic access could perform unauthorized actions within their scope, such as accessing documents they shouldn't have permission to view.
If Mitigated
With proper network segmentation and strict access controls, impact would be limited to the Document Builder module only.
🎯 Exploit Status
Exploitation requires authenticated access to the SAP system; no public exploit code is available at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply SAP Security Note 3477423
Vendor Advisory: https://me.sap.com/notes/3477423
Restart Required: Yes
Instructions:
1. Download SAP Note 3477423 from SAP Support Portal. 2. Apply the note using SAP Note Assistant or transaction SNOTE. 3. Restart affected SAP application servers. 4. Verify the patch is active.
🔧 Temporary Workarounds
Restrict Function Module Access
allTemporarily restrict access to the vulnerable function module using authorization objects until patching can be completed.
Use transaction SU24 to adjust authorization checks for the affected function module
🧯 If You Can't Patch
- Implement strict role-based access controls to limit which users can access SAP Document Builder functionality.
- Monitor for unusual activity in SAP audit logs related to document access and function module calls.
🔍 How to Verify
Check if Vulnerable:
Check if SAP Note 3477423 is applied using transaction SNOTE or by checking the applied notes in system status.
Check Version:
Use transaction SM51 to check SAP system version and applied notes.
Verify Fix Applied:
Verify SAP Note 3477423 is successfully implemented and test authorization checks for the affected function module.
📡 Detection & Monitoring
Log Indicators:
- Unusual function module calls in SAP security audit logs (SM20/SM21)
- Multiple failed authorization checks followed by successful access to restricted functions
Network Indicators:
- Unusual patterns of SAP GUI or RFC calls to Document Builder functions
SIEM Query:
Search for event IDs related to SAP authorization failures (AUDIT_LEVEL=1 events) followed by successful access to sensitive transactions.