CVE-2024-39591

4.3 MEDIUM

📋 TL;DR

CVE-2024-39591 is an authorization bypass vulnerability in SAP Document Builder where a specific function module lacks proper authorization checks. This allows authenticated users to escalate privileges and access unauthorized functionality, affecting organizations using vulnerable SAP Document Builder installations.

💻 Affected Systems

Products:
  • SAP Document Builder
Versions: Specific versions not detailed in advisory; affected versions are those prior to the patch mentioned in SAP Note 3477423
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the SAP system; vulnerability exists in standard configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could gain administrative privileges within the SAP Document Builder application, potentially accessing sensitive documents or manipulating document workflows.

🟠

Likely Case

An authenticated user with basic access could perform unauthorized actions within their scope, such as accessing documents they shouldn't have permission to view.

🟢

If Mitigated

With proper network segmentation and strict access controls, impact would be limited to the Document Builder module only.

🌐 Internet-Facing: LOW - SAP Document Builder is typically deployed in internal enterprise environments, not directly internet-facing.
🏢 Internal Only: MEDIUM - Internal users with any level of access could potentially exploit this vulnerability to escalate privileges within the application.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Exploitation requires identifying and calling the vulnerable function module with appropriate parameters.

Exploitation requires authenticated access to the SAP system; no public exploit code is available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3477423

Vendor Advisory: https://me.sap.com/notes/3477423

Restart Required: Yes

Instructions:

1. Download SAP Note 3477423 from SAP Support Portal. 2. Apply the note using SAP Note Assistant or transaction SNOTE. 3. Restart affected SAP application servers. 4. Verify the patch is active.

🔧 Temporary Workarounds

Restrict Function Module Access

all

Temporarily restrict access to the vulnerable function module using authorization objects until patching can be completed.

Use transaction SU24 to adjust authorization checks for the affected function module

🧯 If You Can't Patch

  • Implement strict role-based access controls to limit which users can access SAP Document Builder functionality.
  • Monitor for unusual activity in SAP audit logs related to document access and function module calls.

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3477423 is applied using transaction SNOTE or by checking the applied notes in system status.

Check Version:

Use transaction SM51 to check SAP system version and applied notes.

Verify Fix Applied:

Verify SAP Note 3477423 is successfully implemented and test authorization checks for the affected function module.

📡 Detection & Monitoring

Log Indicators:

  • Unusual function module calls in SAP security audit logs (SM20/SM21)
  • Multiple failed authorization checks followed by successful access to restricted functions

Network Indicators:

  • Unusual patterns of SAP GUI or RFC calls to Document Builder functions

SIEM Query:

Search for event IDs related to SAP authorization failures (AUDIT_LEVEL=1 events) followed by successful access to sensitive transactions.

🔗 References

📤 Share & Export