CVE-2024-47580

6.8 MEDIUM

📋 TL;DR

This vulnerability allows authenticated administrators to exploit an exposed webservice to create PDFs with embedded attachments. By specifying internal server files as attachments and downloading the generated PDFs, attackers can read any file on the server. This affects SAP systems with the vulnerable webservice enabled.

💻 Affected Systems

Products:
  • SAP systems with vulnerable webservice
Versions: Specific versions not provided in CVE details, refer to SAP Note 3536965
Operating Systems: All supported SAP platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator authentication and the vulnerable webservice to be enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server file system disclosure including sensitive configuration files, credentials, and proprietary data.

🟠

Likely Case

Unauthorized reading of sensitive files containing credentials, configuration data, or business information.

🟢

If Mitigated

Limited impact if proper access controls and monitoring are in place to detect unusual PDF generation activities.

🌐 Internet-Facing: MEDIUM - Requires administrator authentication but could be exploited if admin credentials are compromised.
🏢 Internal Only: HIGH - Internal administrators or compromised admin accounts can exploit this without external access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials and knowledge of the vulnerable webservice endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to SAP Note 3536965 for specific patch information

Vendor Advisory: https://me.sap.com/notes/3536965

Restart Required: Yes

Instructions:

1. Review SAP Note 3536965 for your specific SAP product version. 2. Apply the security patch provided by SAP. 3. Restart affected SAP services. 4. Verify the fix by testing the vulnerable functionality.

🔧 Temporary Workarounds

Disable vulnerable webservice

all

Disable the specific webservice endpoint that allows PDF generation with embedded attachments.

Specific commands depend on SAP product and configuration - refer to SAP documentation

Restrict administrator access

all

Implement strict access controls and monitoring for administrator accounts.

🧯 If You Can't Patch

  • Implement strict monitoring of PDF generation activities and file access patterns
  • Enforce least privilege for administrator accounts and implement multi-factor authentication

🔍 How to Verify

Check if Vulnerable:

Check if your SAP system has the vulnerable webservice enabled and review SAP Note 3536965 applicability.

Check Version:

Use SAP transaction code SM51 or check system information in SAP GUI

Verify Fix Applied:

After applying SAP patches, verify that the PDF generation service no longer allows embedding internal server files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual PDF generation activities by administrator accounts
  • Multiple file read attempts through PDF service

Network Indicators:

  • Unusual traffic patterns to PDF generation endpoints
  • Large PDF downloads by administrator accounts

SIEM Query:

source="sap_logs" AND (event="pdf_generation" OR service="vulnerable_webservice") AND user_role="administrator" AND file_path="internal_server_path*"

🔗 References

📤 Share & Export