Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Authorization check SE80 for where-used list, SAP security note 1232490

Description

In the result list of the where-used list, you can display source code in different ways. In addition to the immediate display of a strictly limited part (for example, a line of ABAP code), you can extend this part by expanding it, and you can then view it in its context. However, from the result list of a where-used list, you can also go to display mode or change mode for a hit. This takes you to the relevant processing tool for the workbench object. These tools also often have separate transaction codes. In many cases, you can access them only using the Object Navigator (transaction SE80).

Therefore, the authorization to execute transaction SE80 is of central importance for the assignment to developer profiles.

Even before calling the where-used list, both when directly calling it in transaction SE84 and when calling it from other transactions (for example, transaction SE16N), the system therefore checks
whether an authorization to start the Object Navigator (transaction SE80) is assigned to your user profile.

Available fix and Supported packages

  • SAP_APPL | 31I | 31I
  • SAP_APPL | 40B | 40B
  • SAP_APPL | 45B | 45B
  • SAP_BASIS | 46C | 46C
  • SAP_BASIS | 620 | 640
  • SAP_BASIS | 700 | 702
  • SAP_BASIS | 710 | 720
  • SAP_APPL 31I | SAPKH31IB9 |
  • SAP_APPL 40B | SAPKH40B89 |
  • SAP_APPL 45B | SAPKH45B67 |
  • SAP_BASIS 620 | SAPKB62065 |
  • SAP_BASIS 640 | SAPKB64023 |
  • SAP_BASIS 711 | SAPKB71101 |
  • SAP_BASIS 710 | SAPKB71007 |
  • SAP_BASIS 700 | SAPKB70017 |
  • SAP_BASIS 701 | SAPKB70102 |
  • SAP_BASIS 711 | SAPKB71103 |
  • SAP_BASIS 640 | SAPKB64025 |
  • SAP_BASIS 701 | SAPKB70105 |
  • SAP_BASIS 700 | SAPKB70020 |
  • SAP_BASIS 710 | SAPKB71009 |
  • SAP_BASIS 702 | SAPKB70201 |
  • SAP_BASIS 46C | SAPKB46C59 |
  • SAP_BASIS 620 | SAPKB62067 |

Affected component

    BC-DWB-TOO
    Workbench Tools: Editors, Painter, Modeler

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1232490

TAGS

#Where-used-list

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,