Medium severity6.1NVD Advisory· Published Dec 12, 2017· Updated May 13, 2026
CVE-2017-16679
CVE-2017-16679
Description
URL redirection vulnerability in SAP's Startup Service, SAP KERNEL 32 NUC, SAP KERNEL 32 Unicode, SAP KERNEL 64 NUC, SAP KERNEL 64 Unicode 7.21, 7.21EXT, 7.22 and 7.22EXT; SAP KERNEL 7.21, 7.22, 7.45, 7.49 and 7.52, that allows an attacker to redirect users to a malicious site.
Affected products
8cpe:2.3:o:sap:sap_kernel:7.21:*:*:*:*:*:*:*+ 6 more
- cpe:2.3:o:sap:sap_kernel:7.21:*:*:*:*:*:*:*
- cpe:2.3:o:sap:sap_kernel:7.21ext:*:*:*:*:*:*:*
- cpe:2.3:o:sap:sap_kernel:7.22:*:*:*:*:*:*:*
- cpe:2.3:o:sap:sap_kernel:7.22ext:*:*:*:*:*:*:*
- cpe:2.3:o:sap:sap_kernel:7.45:*:*:*:*:*:*:*
- cpe:2.3:o:sap:sap_kernel:7.49:*:*:*:*:*:*:*
- cpe:2.3:o:sap:sap_kernel:7.52:*:*:*:*:*:*:*
- SAP/SAP Startup Servicev5Range: SAP KERNEL 32 NUC, SAP KERNEL 32 Unicode, SAP KERNEL 64 NUC, SAP KERNEL 64 Unicode 7.21, 7.21EXT, 7.22 and 7.22EXT; SAP KERNEL 7.21, 7.22, 7.45, 7.49 and 7.52.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.securityfocus.com/bid/102157nvdThird Party AdvisoryVDB Entry
- blogs.sap.com/2017/12/12/sap-security-patch-day-december-2017/nvdIssue TrackingVendor Advisory
- launchpad.support.sap.comnvdPermissions RequiredVendor Advisory
News mentions
0No linked articles in our index yet.