Multiple Denial of Service vulnerabilities in SBSPEXT_HTMLB

Impact on Business

By exploiting these vulnerabilities, an attacker, authenticated as a non-administrative user, has the ability to significantly degrade the service quality experienced by legitimate users. These attacks introduce large response delays, excessive losses, and service interruptions, resulting in direct impact on availability.

Vulnerability Details

One page of the BSP Application HTMLB_SAMPLES, part of the package SBSPEXT_HTMLB, does not properly restrict the parameters it receives, leading to a situation that can be abused by a non-administrative user of the SAP system to consume all resources and trigger a denial of service. A non-administrative user could execute the following request, with certain parameters, multiple times, to lock all processing power of the application.

Solution

SAP has released SAP Note 3303060 which provides patched versions of the affected components.

The patches can be downloaded from https://me.sap.com/notes/3303060 

Onapsis strongly recommends SAP customers to download the related security fixes and apply them to the affected components in order to reduce business risks.

Report Timeline

  • 01/25/2023: Onapsis reports vulnerability to SAP
  • 04/11/2023: SAP issues the patch

References

Back to Advisories

Advisory Information

  • Public Release Date: 09/02/2025
  • Security Advisory ID: ONAPSIS-2024-0053
  • Researcher(s): Juan Pablo Perez Etchegoyen

Vulnerability Information

  • Vendor: SAP
  • Affected Components:
    •  SAP NetWeaver AS ABAP (Business Server Pages)
    • SAP BASIS
      (Check SAP Note 3303060 for detailed information on affected releases)
  • Vulnerability Class: CWE-400: Uncontrolled Resource Consumption
  • CVSS v3 score: 5.3 (AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H)
  • Risk Level: Medium
  • Assigned CVE: CVE-2023-29185
  • Vendor patch Information: SAP Security NOTE 3303060

Affected Components Description

  • SAP_BASIS 700 SP 33-40
  • SAP_BASIS 701 SP 18-25
  • SAP_BASIS 702 SP 18-25
  • SAP_BASIS 731 SP 25-32
  • SAP_BASIS 740 SP 22-29
  • SAP_BASIS 750 SP 26
  • SAP_BASIS 751 SP 16
  • SAP_BASIS 752 SP 12
  • SAP_BASIS 753 SP 10
  • SAP_BASIS 754 SP 08
  • SAP_BASIS 755 SP 06
  • SAP_BASIS 756 SP 04
  • SAP_BASIS 757 SP 02

About our Research Labs

Onapsis Research Labs provides the industry analysis of key security issues that impact mission-critical systems and applications.

Delivering frequent and timely security and compliance advisories with associated risk levels, Onapsis Research Labs combine in-depth knowledge and experience to deliver technical and business-context with sound security judgment to the broader information security community.

Find all reported vulnerabilities at:
https://github.com/Onapsis/vulnerability_advisories

This advisory is licensed under a Creative Commons 4.0 BY-ND International License