Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Dangerous ABAP Commands; DELETE REPORT in RSBTCDRP, SAP security note 1576055

Description

SAP Batch contains code that permits the execution of arbitrary program code of the user#s choice.
A malicious user can therefore control the behavior of the system, or can potentially escalate privileges by executing malicious code, without having their own legitimate credentials.

Available fix and Supported packages

  • SAP_APPL | 31I | 31I
  • SAP_APPL | 40B | 40B
  • SAP_APPL | 45B | 45B
  • SAP_BASIS | 46A | 46D
  • SAP_BASIS | 610 | 640
  • SAP_BASIS | 700 | 702
  • SAP_APPL 31I | SAPKH31IB9 |
  • SAP_APPL 40B | SAPKH40B89 |
  • SAP_APPL 45B | SAPKH45B67 |
  • SAP_BASIS 46B | SAPKB46B62 |
  • SAP_BASIS 46D | SAPKB46D45 |
  • SAP_BASIS 46C | SAPKB46C62 |
  • SAP_BASIS 620 | SAPKB62070 |
  • SAP_BASIS 640 | SAPKB64028 |
  • SAP_BASIS 702 | SAPKB70208 |
  • SAP_BASIS 700 | SAPKB70025 |
  • SAP_BASIS 701 | SAPKB70110 |

Affected component

    BC-CCM-BTC
    Background Processing

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1576055

TAGS

#Backdoor
#injection
#run
#credentials
#SAP-Batch

More to explorer

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.