Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Authorization check for transaction calls in program, SAP security note 1462348

Description

This security note has been updated. For more detailed information, see Security Note 1526587.

Due to a vulnerability which exists in the transaction call from programs which is part of the SAP Supplier Relationship Management (SAP SRM) solution, it is possible for a hacker to access restricted SAP transactions at runtime. This can lead to any or all of the following:

Manipulation of Business Logic resulting in inconsistent data states.
This may lead to violation of regulatory compliance as the vulnerability allows for unprivileged access to critical business logic.

Affected Releases:

  •   SAP SRM 4.0
  • SAP SRM 5.0
  •   SAP SRM 6.0
  •   SAP SRM 7.0
  • SAP SRM 7.01

Available fix and Supported packages

  • SRM_SERVER | 500 | 500
  • SRM_SERVER | 550 | 550
  • SRM_SERVER | 600 | 600
  • SRM_SERVER | 700 | 700
  • SRM_SERVER | 701 | 701
  • SRM_SERVER 600 | SAPKIBKU06 |
  • SRM_SERVER 550 | SAPKIBKT17 |
  • SRM_SERVER 701 | SAPK-70102INSRMSRV |
  • SRM_SERVER 500 | SAPKIBKS17 |
  • SRM_SERVER 700 | SAPKIBKV09 |

Affected component

    SRM-EBP-PD
    Procurement Document Methods

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1462348

TAGS

#SRM
#Supplier-Relationship-Management
#procurement
#E-Commerce
#Web
#business-to-business
#SAP-Business-to-Business-Procurement-BBP
#business-to-business
#e-business
#Ebusiness
#Internet
#EBP
#Enterprise-Buyer
#EnterpriseBuyer-professional-edition
#SRM_SERVER
#Security-vulnerability
#Dynamic-Function-call.

More to explorer