Security Experts:

Connect with us

Hi, what are you looking for?



SAP Patches Critical Clickjacking Vulnerabilities

SAP released a set of monthly security updates for July 2016, which included 10 security notes, one of which was rated Hot News.

SAP released a set of monthly security updates for July 2016, which included 10 security notes, one of which was rated Hot News.

According to SAP’s advisory, the most notable vulnerability in Security Patch Day – July 2016 was a Clickjacking flaw in multiple SAP frameworks and technologies. While only one of the 10 issues patched this month was rated Hot News, 2 were High severity vulnerabilities and the rest of 7 were considered Medium risk.

In addition to the Clickjacking bug, the company resolved two denial of service flaws, two missing authorization checks, one code injection, one cross-site scripting issue, and three other vulnerabilities across its products.

The 10 SAP Security Patch Day Notes were accompanied by 26 Support Package Notes for a total of 36 vulnerabilities resolved in SAP’s products, ERPScan, a company that specializes in securing SAP business software, reveals. Of the 26 Support Package Notes, 24 were rated Medium risk and two were assessed with a Low severity rating.

As it turns out, Clickjacking dominated the Support Package Notes, as a total of 24 such vulnerabilities were patched in various SAP products. Although Clickjacking is a vulnerability type discovered 8 years ago, SAP paid attention to it only this year (while 24 such flaws are patched this month, only two SAP Security Notes addressing the issue were released before).

The Hot News vulnerability in the new set of patches is a Code injection issue in SAP Solution Manager, with a CVSS Base Score of 9.9. Successful exploitation would allow an attacker to inject and run their own code, obtain additional information, modify data, modify the system output, create new users with higher privileges, control the behavior of the system, escalate privileges by executing malicious code, and even perform a DoS attack.

The high risk issues patched this month include a denial of service vulnerability in SAP Sybase products with a CVSS Base Score of 7.5, and a Java Deserialization vulnerability in Adobe Interactive Forms, which has a CVSS Base Score or 7.3. The former was identified by ERPScan researchers, along with a Buffer overflow vulnerability in SAP Startup Service (CVSS Base Score: 6.5) and a Denial of service vulnerability in SAP Enterprise Portal: Federated Portal Network (CVSS Base Score: 4.9).

Also worth mentioning is a missing authorization check vulnerability in SAP HANA Enterprise (CVSS Base Score: 5.5), which could allow an attacker to access a service without any authorization procedures and use functionality that has a restricted access. Successful exploitation of this issue could result in information disclosure, privilege escalation, and other attacks.

Related: Five-year-old SAP Vulnerability Haunts Global Businesses

Related: SAP Patches Critical Code Injection, XSS Vulnerabilities

Written By

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.