CVE-2024-41737

5.0 MEDIUM

📋 TL;DR

CVE-2024-41737 is a server-side request forgery (SSRF) vulnerability in SAP CRM ABAP Insights Management that allows authenticated attackers to enumerate HTTP endpoints on internal networks. This affects organizations running vulnerable SAP CRM systems with authenticated user access. The vulnerability enables information disclosure but doesn't impact system integrity or availability.

💻 Affected Systems

Products:
  • SAP CRM ABAP (Insights Management)
Versions: Specific versions not detailed in references; consult SAP Note 3487537 for exact affected versions
Operating Systems: Any OS running SAP CRM
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SAP CRM with Insights Management component; authentication is required for exploitation

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could map internal network infrastructure, discover sensitive internal services, and potentially chain with other vulnerabilities for lateral movement.

🟠

Likely Case

Internal network reconnaissance leading to information about backend systems, APIs, and services that shouldn't be externally visible.

🟢

If Mitigated

Limited to discovering endpoint existence without accessing actual data, with proper network segmentation preventing further exploitation.

🌐 Internet-Facing: MEDIUM - Requires authentication but could be exploited if attackers gain valid credentials through other means.
🏢 Internal Only: HIGH - Authenticated internal users or compromised accounts could easily exploit this for network reconnaissance.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and specially crafted HTTP requests; no public exploit code identified

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3487537

Vendor Advisory: https://me.sap.com/notes/3487537

Restart Required: Yes

Instructions:

1. Download SAP Note 3487537 from SAP Support Portal. 2. Apply the note to affected SAP CRM systems. 3. Restart the application server. 4. Verify the patch is active.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict SAP CRM system's outbound HTTP access to internal networks

Access Control

all

Implement strict authentication and authorization controls for SAP CRM users

🧯 If You Can't Patch

  • Implement network egress filtering to restrict SAP system's HTTP requests to internal networks
  • Monitor for unusual HTTP request patterns from SAP CRM systems to internal endpoints

🔍 How to Verify

Check if Vulnerable:

Check if SAP Note 3487537 is applied in transaction SNOTE; verify system runs affected SAP CRM version

Check Version:

Transaction SE38: Execute report RSVERSION to check SAP CRM version

Verify Fix Applied:

Confirm SAP Note 3487537 is active and test that crafted HTTP requests no longer enumerate internal endpoints

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests from SAP CRM to internal IP ranges
  • Multiple failed HTTP requests to different internal endpoints

Network Indicators:

  • HTTP traffic from SAP systems to unexpected internal services
  • Pattern of sequential HTTP requests to internal network ranges

SIEM Query:

source_ip=SAP_CRM_IP AND dest_ip=INTERNAL_SUBNET AND http_method=GET AND status_code=200/404

🔗 References

📤 Share & Export