Skip links

Potential remote code execution in Webi Rich Client, SAP security note 1826001

Description

A malicious user can exploit Web Intelligence Rich Client to enable them to execute arbitrary code in the product.

Available fix and Supported packages

  • BOEWEBAPPJAVA | 3.1 | 3.1

Affected component

    BI-RA-WBI
    Web Intelligence

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1826001

TAGS

#Web-Intelligence-Rich-Client
#arbitrary-code-execution

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies

SAP Security Patch Day RedRays

May 2024 SAP Security Patch Day

Vulnerability: Multiple vulnerabilities in SAP CX Commerce SAP Component: CEC-SCC-PLA-PL CVE ID: CVE-2019-17495 CVSS Score: 9.8 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Category: Program error