{"id":1684,"date":"2024-08-13T15:28:29","date_gmt":"2024-08-13T12:28:29","guid":{"rendered":"https:\/\/techltx.com\/de\/?p=1684"},"modified":"2024-08-13T15:28:32","modified_gmt":"2024-08-13T12:28:32","slug":"sap-security-patchday-august-24-sap-build-apps","status":"publish","type":"post","link":"https:\/\/techltx.com\/de\/sap\/sap-security-patchday-august-24-sap-build-apps\/2024\/08\/","title":{"rendered":"SAP Security Patchday August 2024 | SAP BuildApp und SAP BO"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>Liebe Leserinnen und Leser,<\/p>\n<p>w\u00e4hrend die Sommerferien in Europa zu Ende gehen, macht die IT-Sicherheit keine Pause. Heute, am 13. August 2024, hat SAP, Europas f\u00fchrender Unternehmenssoftwarehersteller, wichtige Sicherheitsupdates ver\u00f6ffentlicht. Diese umfassen zwei HotNews und vier Meldungen mit einem CVSS Score von \u00fcber 7, die dringende Ma\u00dfnahmen zur Gew\u00e4hrleistung der Stabilit\u00e4t und Sicherheit gesch\u00e4ftskritischer Anwendungen erfordern. Besonders hervorzuheben ist, dass auch eine Schwachstelle in SAP Build Apps identifiziert wurde, die durch eine veraltete Node.js-Version verursacht wurde und die Entwicklerteams zu sofortigem Handeln zwingt.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/techltx.com\/wp-content\/uploads\/2023\/06\/sap-security-patchday.png\"><img loading=\"lazy\" decoding=\"async\" width=\"491\" height=\"155\" src=\"https:\/\/techltx.com\/wp-content\/uploads\/2023\/06\/sap-security-patchday.png\" alt=\"SAP Security Note Patch Day 2024-04  April\" class=\"wp-image-248\" srcset=\"https:\/\/techltx.com\/wp-content\/uploads\/2023\/06\/sap-security-patchday.png 491w, https:\/\/techltx.com\/wp-content\/uploads\/2023\/06\/sap-security-patchday-300x95.png 300w\" sizes=\"auto, (max-width: 491px) 100vw, 491px\" \/><\/a><\/figure>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">SAP Note 3479478 Missing Authentication check in SAP BusinessObjects Business Intelligence Platform\u00a0<\/h2>\n\n\n\n<p>Die Sicherheitsnote 3479478, ver\u00f6ffentlicht am 13. August 2024, beschreibt eine kritische Schwachstelle in der SAP BusinessObjects Business Intelligence Platform, speziell bei der Verwendung von Single Sign-On im Enterprise-Authentifizierungsschema. Ein nicht autorisierter Benutzer k\u00f6nnte \u00fcber ein REST-Endpunkt ein Anmelde-Token erhalten und das System vollst\u00e4ndig kompromittieren. Dies hat hohe Auswirkungen auf die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit des Systems. Die Konfiguration der Single Sign-On Enterprise-Authentifizierung ist nun standardm\u00e4\u00dfig sicher. Dieses Problem wurde in den Patches behoben, die im Abschnitt &#8222;Supportpakete &#038; Patches&#8220; aufgelistet sind. F\u00fcr weitere Informationen zu Wartungspl\u00e4nen und Strategien der Business Intelligence Platform verweisen wir auf den Knowledge Base-Artikel 2144559.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SAP Note 3477196 Server-Side Request Forgery vulnerability in applications built with SAP Build Apps\u00a0<\/h2>\n\n\n\n<p>Eine weitere HotNews, die Sicherheitsnote 3477196, betrifft die Anwendungen, die mit SAP Build Apps erstellt wurden. Aufgrund der Nutzung einer \u00e4lteren Version der Node.js-Bibliothek sind diese Anwendungen anf\u00e4llig f\u00fcr Server-Side Request Forgery (SSRF), was ein hohes Risiko f\u00fcr die Vertraulichkeit und Integrit\u00e4t darstellt, obwohl die Verf\u00fcgbarkeit nicht beeintr\u00e4chtigt wird. Die L\u00f6sung besteht darin, die Anwendung in SAP Build Apps mit der Version 4.11.130 oder sp\u00e4ter neu zu erstellen. Weitere Dokumentationen zur Verwendung von SAP Build Apps finden Sie in der entsprechenden Hilfe.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">SAP Note 3485284 XML injection in SAP BEx Web Java Runtime Export Web Service\u00a0<\/h2>\n\n\n\n<p>Die Sicherheitsnote 3485284 adressiert eine XML-Injection-Schwachstelle im BEx Web Java Runtime Export Web Service, die nicht ausreichend ein XML-Dokument von einer nicht vertrauensw\u00fcrdigen Quelle validiert. Angreifer k\u00f6nnten Informationen aus dem SAP ADS-System abrufen und die Anzahl der XMLForm-Dienste ersch\u00f6pfen, was die Verf\u00fcgbarkeit des SAP ADS Rendering (PDF-Erstellung) beeintr\u00e4chtigt. Diese Schwachstelle betrifft sowohl die Vertraulichkeit als auch die Verf\u00fcgbarkeit der Anwendung. Der XML-Parser wurde nun aktualisiert, um die Schwachstelle zu pr\u00fcfen. Implementieren Sie die im Sicherheitshinweis referenzierten Supportpakete und Patches, um das Problem zu beheben.<\/p>\n\n\n\n<p>Diese aktuellen Sicherheitsupdates unterstreichen die Bedeutung einer zeitnahen Patch-Implementierung, um die Sicherheit und Stabilit\u00e4t von SAP-Anwendungen zu gew\u00e4hrleisten. Wir raten allen SAP-Nutzern, die notwendigen Schritte einzuleiten und die Patches umgehend zu implementieren.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Hier finden Sie die SAP Notes (sortiert nach dem CVSS-Rank)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>3479478 | 9.8 Hot News | [CVE-2024-41730] Missing Authentication check in SAP BusinessObjects Business Intelligence Platform<\/li>\n\n\n\n<li>Product\u202f- SAP BusinessObjects Business Intelligence Platform, Version \u2013 ENTERPRISE 430, 440<\/li>\n\n\n\n<li>3477196 | 9.1 Hot News | [CVE-2024-29415] Server-Side Request Forgery vulnerability in applications built with SAP Build Apps<\/li>\n\n\n\n<li>Product\u202f- SAP Build Apps, Versions < 4.11.130<\/li>\n\n\n\n<li>3485284 | 8.2 High | [CVE-2024-42374] XML injection in SAP BEx Web Java Runtime Export Web Service Product- SAP BEx Web Java Runtime Export Web Service, Versions &#8211; BI-BASE-E 7.5, BI-BASE-B 7.5, BI-IBC 7.5, BI-BASE-S 7.5, BIWEBAPP 7.5<\/li>\n\n\n\n<li>3423268 | 7.8 High | [CVE-2023-30533] Prototype Pollution in SAP S\/4 HANA (Manage Supply Protection) Product- SAP S\/4 HANA, Library Versions &#8211; SheetJS CE < 0.19.3<\/li>\n\n\n\n<li>3460407 | 7.5 High | Update to Security Note released on June 2024 Patch Day: [CVE-2024-34688] Denial of service (DOS) in SAP NetWeaver AS Java (Meta Model Repository) Product- SAP NetWeaver AS Java, Version \u2013 MMR_SERVER 7.5<\/li>\n\n\n\n<li>3459935 | 7.4 High | [CVE-2024-33003] Information Disclosure Vulnerability in SAP Commerce Cloud Product- SAP Commerce Cloud, Versions \u2013 HY_COM 1808, 1811, 1905, 2005, 2105, 2011, 2205, COM_CLOUD 2211<\/li>\n\n\n\n<li>3466801 | 6.9 Medium | Update to Security Note released on July 2024 Patch Day: [CVE-2024-39593] Information Disclosure vulnerability in SAP Landscape Management Product- SAP Landscape Management, Version &#8211; VCM 3.00<\/li>\n\n\n\n<li>3495876 | 6.5 Medium | [Multiple CVEs] Multiple vulnerabilities in SAP Replication Server (FOSS) CVEs &#8211; CVE-2023-0215,\u202fCVE-2022-0778\u202f, CVE-2023-0286 Product- SAP Replication Server, Versions \u2013 16.0.3, 16.0.4<\/li>\n\n\n\n<li>3459379 | 6.5 Medium | Update to Security Note released on June 2024 Patch Day: [CVE-2024-34683] Unrestricted file upload in SAP Document Builder (HTTP service) Product\u202f- SAP Document Builder, Versions \u2013 S4CORE 100, 101, S4FND 102, 103, 104, 105, 106, 107, 108, SAP_BS_FND 702, 731, 746, 747, 748<\/li>\n\n\n\n<li>3474590 | 6.5 Medium | [CVE-2024-42376] Multiple Missing Authorization Check vulnerabilities in SAP Shared Service Framework<\/li>\n\n\n\n<li>Product- SAP Shared Service Framework, Versions \u2013 SAP_BS_FND 702, 731, 746, 747, 748<\/li>\n\n\n\n<li>3438085 | 6.3 Medium | [CVE-2024-33005] Missing Authorization check in SAP NetWeaver Application Server (ABAP and Java), SAP Web Dispatcher and SAP Content Server Product- SAP NetWeaver Application Server (ABAP and Java), SAP Web Dispatcher and SAP Content Server, Versions \u2013 KRNL64NUC 7.22, 7.22EXT, KRNL64UC 7.22, 7.22EXT, 7.53, WEBDISP 7.53, 7.77, 7.85, 7.22_EXT, 7.89, 7.54, 7.93, KERNEL 7.22, 7.53, 7.77, 7.85, 7.89, 7.54, 7.93<\/li>\n\n\n\n<li>3482217 | 6.1 Medium | Update to Security Note released on July 2024 Patch Day: [CVE-2024-39594] Multiple Cross-Site Scripting (XSS) vulnerabilities in SAP Business Warehouse &#8211; Business Planning and Simulation Product- SAP Business Warehouse &#8211; Business Planning and Simulation, Versions \u2013 SAP_BW 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, SAP_BW_VIRTUAL_COMP 701<\/li>\n\n\n\n<li>3465455 | 5.5 Medium | Update to Security Note released on June 2024 Patch Day: [CVE-2024-37176] Missing Authorization check in SAP BW\/4HANA Transformation and DTP Product- SAP BW\/4HANA Transformation and Data Transfer Process, Versions \u2013 DW4CORE 200, 300, 400, 796, SAP_BW 740, 750, 751, 752, 753, 754, 755, 756, 757, 758<\/li>\n\n\n\n<li>3483256 | 5.4 Medium | [CVE-2024-41735] Cross-Site Scripting (XSS) vulnerability in SAP Commerce Backoffice Product\u202f\u2013 SAP Commerce Backoffice, Version \u2013 HY_COM 2205<\/li>\n\n\n\n<li>3471450 | 5.3 Medium | [CVE-2024-41733] Information Disclosure Vulnerability in SAP Commerce Product\u202f\u2013 SAP Commerce, Versions \u2013 HY_COM 2205, COM_CLOUD 2211<\/li>\n\n\n\n<li>3487537 | 5.0 Medium | [CVE-2024-41737] Server-Side Request Forgery (SSRF) in SAP CRM ABAP (Insights Management)<\/li>\n\n\n\n<li>Product\u202f\u2013 SAP CRM ABAP (Insights Management), Versions \u2013 BBPCRM 700, 701, 702, 712, 713, 714<\/li>\n\n\n\n<li>3458789 | 5.0 Medium | Update to Security Note released on July 2024 Patch Day: [CVE-2024-34689] Server-Side Request Forgery in SAP Business Workflow (WebFlow Services)\u202f Product- SAP Business Workflow (WebFlow Services), Versions \u2013 SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758<\/li>\n\n\n\n<li>3468102 | 4.7 Medium | [CVE-2024-41732] Improper Access Control in SAP Netweaver Application Server ABAP<\/li>\n\n\n\n<li>Product\u202f\u2013 SAP NetWeaver Application Server ABAP, Versions \u2013 SAP_UI 754, 755, 756, 757, 758, SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 912<\/li>\n\n\n\n<li>3150704 | 4.5 Medium | Update to Security Note released on January 2023 Patch Day: [CVE-2023-0023] Information Disclosure in SAP Bank Account Management (Manage Banks) Product\u202f\u2013 SAP Bank Account Management (Manage Banks), Versions \u2013 800, 900<\/li>\n\n\n\n<li>3433545 | 4.3 Medium | [CVE-2024-42375] Multiple Unrestricted File Upload vulnerabilities in SAP BusinessObjects Business Intelligence Platform<\/li>\n\n\n\n<li>Additional CVE &#8211; CVE-2024-28166, CVE-2024-41731 Product\u202f\u2013 SAP BusinessObjects Business Intelligence Platform, Versions \u2013 ENTERPRISE 420, 430, 440<\/li>\n\n\n\n<li>3475427 | 4.3 Medium | [CVE-2024-41736] Information Disclosure vulnerability in SAP Permit to Work<\/li>\n\n\n\n<li>Product\u202f\u2013 SAP Permit to Work, Versions \u2013 UIS4HOP1 800, 900<\/li>\n\n\n\n<li>3477423 | 4.3 Medium | [CVE-2024-39591] Missing Authorization check in SAP Document Builder<\/li>\n\n\n\n<li>Product\u202f\u2013 SAP Document Builder, Versions \u2013 S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, S4FND 108, SAP_BS_FND 702, SAP_BS_FND 731, SAP_BS_FND 746, SAP_BS_FND 747, SAP_BS_FND 748<\/li>\n\n\n\n<li>3479293 | 4.3 Medium | [CVE-2024-42373] Missing Authorization Check in SAP Student Life Cycle Management (SLcM)<\/li>\n\n\n\n<li>Product\u202f\u2013 SAP Student Life Cycle Management (SLcM), Versions \u2013 IS-PS-CA 617, 618, 802, 803, 804, 805, 806, 807, 808<\/li>\n\n\n\n<li>3494349 | 4.3 Medium | [CVE-2024-41734] Missing Authorization check in SAP NetWeaver Application Server ABAP and ABAP Platform<\/li>\n\n\n\n<li>Product\u202f\u2013 SAP NetWeaver Application Server ABAP and ABAP Platform, Versions \u2013 SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 912<\/li>\n\n\n\n<li>3454858 | 4.1 Medium | Update to Security Note released on July 2024 Patch Day: [CVE-2024-37180] Information Disclosure vulnerability in SAP NetWeaver Application Server for ABAP and ABAP Platform Product- SAP NetWeaver Application Server for ABAP and ABAP Platform, Versions \u2013 SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758<\/li>\n<\/ul>\n\n\n\n<p><strong>Bleiben Sie sicher und halten Sie Ihr System auf dem neuesten <a href=\"https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&#038;rc=10\" target=\"_blank\" rel=\"noreferrer noopener\">Stand<\/a>!<\/strong><\/p>\n\n\n\n<p><strong>Es ist immer wichtig, stets wachsam zu bleiben und sicherzustellen, dass Ihr SAP-System auf dem neuesten Stand ist. Das fr\u00fchzeitige und konsequente Anwenden von Sicherheitspatches sch\u00fctzt nicht nur Ihre Daten, sondern auch die Konsistenz und Integrit\u00e4t Ihres gesamten Unternehmens.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>SAP Security Notes Patch Day Juni 2024 Dieser Artikel ist eine Zusammenfassung \u00fcber die Inhalte und aktuellen Schwachstellen f\u00fcr SAP Systeme.  Am Juni-Patchday warnt SAP vor zehn neuen Sicherheitsl\u00fccken, darunter zwei hochriskante Schwachstellen. Ein kritisches Leck in SAP Financial Consolidation (CVE-2024-37177) gef\u00e4hrdet die Vertraulichkeit und Integrit\u00e4t der Anwendung, w\u00e4hrend eine Schwachstelle in SAP NetWeaver AS Java (CVE-2024-34688) Denial-of-Service-Angriffe erm\u00f6glicht. Weitere mittlere und niedrige Risiken wurden in verschiedenen SAP-Produkten identifiziert und behoben. IT-Verantwortliche sollten die bereitgestellten Updates zeitnah einspielen, um die Sicherheit ihrer Systeme zu gew\u00e4hrleisten.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5,11],"tags":[112,25,12,7],"class_list":["post-1684","post","type-post","status-publish","format-standard","hentry","category-sap","category-sap-security-patch-day","tag-sap-build-apps","tag-java","tag-patchday","tag-sap"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"BALTX","author_link":"https:\/\/techltx.com\/de\/author\/baltx-com\/"},"uagb_comment_info":0,"uagb_excerpt":"SAP Security Notes Patch Day Juni 2024 Dieser Artikel ist eine Zusammenfassung \u00fcber die Inhalte und aktuellen Schwachstellen f\u00fcr SAP Systeme. Am Juni-Patchday warnt SAP vor zehn neuen Sicherheitsl\u00fccken, darunter zwei hochriskante Schwachstellen. Ein kritisches Leck in SAP Financial Consolidation (CVE-2024-37177) gef\u00e4hrdet die Vertraulichkeit und Integrit\u00e4t der Anwendung, w\u00e4hrend eine Schwachstelle in SAP NetWeaver AS&hellip;","_links":{"self":[{"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/posts\/1684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/comments?post=1684"}],"version-history":[{"count":1,"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/posts\/1684\/revisions"}],"predecessor-version":[{"id":1686,"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/posts\/1684\/revisions\/1686"}],"wp:attachment":[{"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/media?parent=1684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/categories?post=1684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/tags?post=1684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}