On the 13th of August 2019, SAP Security Patch Day saw the release of 13 Security Notes.
Notes by severity
|Correction with high priority||2|
|Correction with medium priority||6|
|Correction with low priority||1|
On August Patch Day SAP presents 4 HotNews Security Notes and 2 high-severity Notes.
Starting with the first HotNews Note 2800779 – Remote Code Execution(RCE) in SAP NetWeaver UDDI Server (Services Registry) – with a CVSS Score of 9.9. By injecting code into the working memory, which is then executed by the program, an attacker can take advantage of the Services Registry‘s remote code execution vulnerability and potentially gain total control of the product, including reading, modifying, or deleting data. Moreover, it can be utilized to make the product crash due to a broad flaw.
The next HotNews Note is 2622660 – Security updates for the browser control Google Chromium delivered with SAP Business Client – with a CVSS Score of 9.9. This occurred because of flaws found in Chromium, which SAP Business Client uses as its integrated browser control.
Further Note is 2786035 – Code Injection vulnerabilities in SAP Commerce Cloud (mediaconversion and virtualjdbc extension) – with a CVSS Score of 9.0. Two Remote Code Execution vulnerabilities found in SAP Commerce Cloud are addressed by this SAP security alert (previously SAP Hybris Commerce). The SAP Commerce Cloud‘s most recent patch release must be applied to the affected component.
The last note to describe is 2813811 – Server-Side Request Forgery in SAP NetWeaver Application Server for Java (Administrator System Overview) – with a CVSS Score of 9.0. An attacker is able to send a specially crafted request from a weak web application using the Java System Overview feature in SAP NetWeaver Administrator (NWA). A Server-Side Request Forgery vulnerability results from its typical use to attack internal systems protected by firewalls that are often unreachable to an attacker from the outside network.