Skip to main content

CVE-2023-49584: CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') in SAP_SE SAP Fiori Launchpad

Medium
VulnerabilityCVE-2023-49584cvecve-2023-49584cwe-444
Published: Tue Dec 12 2023 (12/12/2023, 01:35:22 UTC)
Source: CVE
Vendor/Project: SAP_SE
Product: SAP Fiori Launchpad

Description

SAP Fiori launchpad - versions SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, UI_700 200, SAP_BASIS 793, allows an attacker to use HTTP verb POST on read-only service causing low impact on Confidentiality of the application.

AI-Powered Analysis

AILast updated: 07/08/2025, 20:28:23 UTC

Technical Analysis

CVE-2023-49584 is a medium-severity vulnerability classified under CWE-444, which pertains to inconsistent interpretation of HTTP requests, commonly known as HTTP Request/Response Smuggling. This vulnerability affects multiple versions of the SAP Fiori Launchpad, specifically SAP_UI versions 750 through 758, UI_700 200, and SAP_BASIS 793. The core issue arises from the SAP Fiori Launchpad's handling of HTTP POST requests on services that are intended to be read-only. An attacker can exploit this by sending crafted POST requests to these read-only services, causing the application to process these requests inconsistently. This inconsistency can lead to a low impact on the confidentiality of the application, potentially allowing unauthorized access to sensitive information or data leakage. The vulnerability does not affect the integrity or availability of the system, and no user interaction is required to exploit it. The CVSS v3.1 base score is 4.3, reflecting a medium severity level, with an attack vector of network, low attack complexity, requiring low privileges, and no user interaction. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because SAP Fiori Launchpad is widely used in enterprise environments for SAP application access and management, making it a valuable target for attackers aiming to gain unauthorized information access through subtle protocol manipulation.

Potential Impact

For European organizations, the impact of CVE-2023-49584 primarily concerns the confidentiality of sensitive business data accessed via SAP Fiori Launchpad. Since SAP systems are integral to many European enterprises, especially in sectors like manufacturing, finance, and public administration, any confidentiality breach could lead to exposure of proprietary or personal data, potentially violating GDPR and other data protection regulations. Although the impact is rated low on confidentiality and does not affect integrity or availability, even minor data leaks can have regulatory and reputational consequences. The vulnerability could be leveraged as part of a broader attack chain to gather intelligence or prepare for more severe intrusions. Given the medium severity and the network-based attack vector, attackers could exploit this vulnerability remotely if they have low-level access, which might be possible through compromised credentials or insider threats. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits post-disclosure. Therefore, European organizations using affected SAP versions should consider this vulnerability a moderate risk to their information security posture.

Mitigation Recommendations

To mitigate CVE-2023-49584, European organizations should implement the following specific measures: 1) Conduct an immediate inventory of SAP Fiori Launchpad versions in use to identify affected systems. 2) Apply any SAP-provided patches or updates as soon as they become available; monitor SAP Security Notes and advisories closely. 3) Restrict network access to SAP Fiori Launchpad interfaces, limiting exposure to trusted internal networks or VPNs to reduce the attack surface. 4) Implement strict access controls and monitor for unusual POST requests to read-only services using web application firewalls (WAF) or intrusion detection systems (IDS) with custom rules tailored to detect HTTP request smuggling patterns. 5) Enforce strong authentication and session management to minimize the risk of low-privilege account compromise, as the vulnerability requires low privileges to exploit. 6) Conduct regular security assessments and penetration testing focusing on HTTP request handling to detect similar protocol inconsistencies. 7) Educate SAP administrators and security teams about this vulnerability to ensure timely response and monitoring. These steps go beyond generic advice by focusing on network segmentation, monitoring specific HTTP behaviors, and proactive patch management tailored to SAP environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
sap
Date Reserved
2023-11-27T18:45:03.233Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6831a1510acd01a24927bf49

Added to database: 5/24/2025, 10:37:05 AM

Last enriched: 7/8/2025, 8:28:23 PM

Last updated: 8/15/2025, 9:13:39 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats