Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 3567974
was released on
11.02.2025 and deals with
"[CVE-2025-24876] Authentication bypass via authorization code injection in SAP Approuter" within SAP Approuter.
We advice you to follow the instructions, to resolve
missing security function
with a
high potential for exploitation
in component BC-XS-APR.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as project.
Risk specification
This note has been re-released with updated ‘Symptom’ information. The SAP Approuter allows an unauthenticated attacker to bypass the authentication via authorization code injection, resulting in stealing the session of the victim.Solution
The fix ensures that the URL protocol in the login callback URL is a valid one.
- 9.9 [CVE-2021-33698] Unrestricted File Upload vulnerability in SAP Business One
- 7.1 [CVE-2022-39801] Insufficient Firefighter Session Expiration in SAP GRC Access Control Emergency Access Management
- 6.5 [CVE-2024-34683] Unrestricted file upload in SAP Document Builder (HTTP service)
- 6.3 Unauthorized use of application functions in SAP GUI for HTML
- 5.8 [CVE-2024-45281] DLL hijacking vulnerability in SAP BusinessObjects Business Intelligence Platform