Critical SAP Vulnerability Allows Remote Authentication Bypass 

Published on August 14, 2024
Written by:
Lore Apostol
Lore Apostol
Infosec Writer & Editor

SAP released 17 new ‘Security Notes’ and eight updated fixes in its August 2024 security patch package, including two HotNews and four high-priority notes - an above-average number for the software maker. The critical flaws concern a missing authentication check and a Server-Side Request Forgery vulnerability.

The first HotNews note concerns a flaw tracked as CVE-2024-41730, addressing a Missing Authentication Check vulnerability in the SAP BusinessObjects Business Intelligence Platform versions 430 and 440, earning a 9.8 CVSS rating.

The second new HotNews note, CVE-2024-29415, is a Server-Side Request Forgery vulnerability in the IP package for Node.js in applications built with SAP Build Apps versions under 4.11.130 and has a 9.1 CVSS rating.

An unauthorized user can exploit the missing authentication check bug by getting a logon token using a REST (Representational State Transfer) endpoint via the enabled Single Sign On (SSO) enterprise authentication. This allows an attacker to fully compromise the targeted system. 

The other new high-rated flaws are 3485284 (CVE-2024-42374), which addresses an XML injection in SAP BEx Web Java Runtime Export Web Service versions BI-BASE-E 7.5, BI-BASE-B 7.5, BI-IBC 7.5, BI-BASE-S 7.5, and BIWEBAPP 7.5 and 3423268 (CVE-2023-30533), a Prototype Pollution in SAP S/4 HANA (Manage Supply Protection) in SAP S/4 HANA, Library Versions - SheetJS CE older than 0.19.3.

3459935 (CVE-2024-33003) Information Disclosure Vulnerability in SAP Commerce Cloud versions HY_COM 1808, 1811, 1905, 2005, 2105, 2011, 2205, and COM_CLOUD 2211 is another new flaw with high priority.

Among them is also an update: 3460407 (CVE-2024-34688), a Denial of service (DOS) in SAP NetWeaver AS Java (Meta Model Repository) version MMR_SERVER 7.5.



For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: