SAP Netweaver 7.4 allows remote authenticated users to bypass an intended Unified Connectivity (UCON) access control list and execute arbitrary Remote Function Modules (RFM) by leveraging a connection created from earlier execution of an anonymous RFM included in a Communication Assembly, aka SAP Security Note 2139366.
                
            References
                    | Link | Resource | 
|---|---|
| http://seclists.org/fulldisclosure/2016/Oct/48 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/93501 | |
| https://www.onapsis.com/research/security-advisories/sap-ucon-security-protection-bypass | Permissions Required | 
| http://seclists.org/fulldisclosure/2016/Oct/48 | Mailing List Third Party Advisory | 
| http://www.securityfocus.com/bid/93501 | |
| https://www.onapsis.com/research/security-advisories/sap-ucon-security-protection-bypass | Permissions Required | 
Configurations
                    History
                    21 Nov 2024, 02:50
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://seclists.org/fulldisclosure/2016/Oct/48 - Mailing List, Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/93501 - | |
| References | () https://www.onapsis.com/research/security-advisories/sap-ucon-security-protection-bypass - Permissions Required | 
Information
                Published : 2016-10-13 14:59
Updated : 2025-04-12 10:46
NVD link : CVE-2016-3635
Mitre link : CVE-2016-3635
CVE.ORG link : CVE-2016-3635
JSON object : View
Products Affected
                sap
- netweaver
CWE
                
                    
                        
                        CWE-284
                        
            Improper Access Control
