SAP Patches Critical Security Flaws in Monitoring Solutions
German software maker SAP this week announced the release of 12 new and four updated security notes as part of its March 2022 Patch Day.
The most serious of the documented flaws is rated critical and described as a missing authorization check vulnerability in SAP Focused Run that could lead to complete system compromise.
Tracked as CVE-2022-24396 (CVSS score of 9.3), SAP confirmed that the bug can be exploited to access privileged functionality and tamper with sensitive information and configurations.
“The only thing that prevents it from being tagged with a CVSS score of 10 is that, for a successful exploit to occur, local OS access to the SAP Focused Run system — or to one of the managed systems — is required,” according to Onapsis, a company that tracks application security threats.
Additionally, the software maker updated its security note on the Log4j vulnerabilities to document that fix on new business applications.
This week, SAP also published a “high-severity” security note that resolves CVE-2022-26101 (CVSS score of 8.2), a Cross-Site Scripting (XSS) bug in Fiori Launchpad.
The issue can be exploited without authentication to manipulate the SAP-theme URL parameter to inject HTML code, and create a link that is then supplied to the victim, over the network.