SAP has released security patches to address three vulnerabilities discovered by Onapsis security researchers. SAP released the fixes to form a group of 19 security notes released by the company about a number of security issues.
The patched vulnerabilities are categorized as ICMAD and allow attackers to execute serious malicious activities on SAP users, business information and processes.
This activity then affects unpatched SAP applications. The focus is SAP’s Internet Communication Manager (ICM). ICM enables HTTP(S) communications in SAP systems.
According to the Onapsis researchers, threat actors exploit the flaw by sending malicious payloads using various HTTP smuggling techniques.
They can successfully exploit SAP Java or ABAP systems if an HTTP request cannot be distinguished from a valid message. Vulnerabilities in affected systems can be exploited over the internet and pre-authentication, i.e. they cannot be restricted by using multi-factor authentication controls.
“Abusing these vulnerabilities could be simple for an attacker as it requires no previous authentication, no necessary preconditions, and the payload can be sent through HTTP(S),” explained JP Perez-Etchegoyen, Onapsis CTO.
For more information, read the original story in ZDNet.