Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

CIC Unauthorized usage of application functionality, SAP security note 1512891

Description

A malicious user can trigger functionality in IS-U without authentication and authorization.

Available fix and Supported packages

  • FI-CA | 600 | 600
  • FI-CA | 602 | 602
  • FI-CA | 603 | 603
  • FI-CA | 604 | 604
  • FI-CA | 605 | 605
  • IS-UT | 600 | 600
  • IS-UT | 602 | 602
  • IS-UT | 604 | 604
  • IS-UT | 605 | 605
  • FI-CA 600 | SAPK-60019INFICA |
  • FI-CA 602 | SAPK-60209INFICA |
  • FI-CA 603 | SAPK-60308INFICA |
  • FI-CA 604 | SAPK-60409INFICA |
  • FI-CA 605 | SAPK-60503INFICA |
  • IS-UT 600 | SAPK-60019INISUT |
  • IS-UT 602 | SAPK-60209INISUT |
  • IS-UT 604 | SAPK-60409INISUT |
  • IS-UT 605 | SAPK-60504INISUT |

Affected component

    IS-U-CS
    Customer Service

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1512891

TAGS

#Cross-Site-Request-Forgery
#XSRF
#FI-CA
#IS-U-CS
#HTML-customer-informartion
#action-box-calls

Explore More

RedRays AI for ABAP Code Security

Empowering Secure, Efficient, and Compliant SAP ABAP Developmentā€”in Real Time and Without Data Retention In today’s rapidly evolving business landscape, organizations increasingly

Special offer for SAP Security Udemy course!

$ 9.99

Join ā€œSAP Security Core Concepts and Security Administrationā€ which is part of theĀ BlackhatĀ course series.Ā