Skip links
🔥🔥🔥 Join us for our upcoming training session at Black Hat MEA: "Securing SAP Systems: Expert Insights and Penetration Testing Techniques" 🛡️🔍

CIC Unauthorized usage of application functionality, SAP security note 1512891

Description

A malicious user can trigger functionality in IS-U without authentication and authorization.

Available fix and Supported packages

  • FI-CA | 600 | 600
  • FI-CA | 602 | 602
  • FI-CA | 603 | 603
  • FI-CA | 604 | 604
  • FI-CA | 605 | 605
  • IS-UT | 600 | 600
  • IS-UT | 602 | 602
  • IS-UT | 604 | 604
  • IS-UT | 605 | 605
  • FI-CA 600 | SAPK-60019INFICA |
  • FI-CA 602 | SAPK-60209INFICA |
  • FI-CA 603 | SAPK-60308INFICA |
  • FI-CA 604 | SAPK-60409INFICA |
  • FI-CA 605 | SAPK-60503INFICA |
  • IS-UT 600 | SAPK-60019INISUT |
  • IS-UT 602 | SAPK-60209INISUT |
  • IS-UT 604 | SAPK-60409INISUT |
  • IS-UT 605 | SAPK-60504INISUT |

Affected component

    IS-U-CS
    Customer Service

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1512891

TAGS

#Cross-Site-Request-Forgery
#XSRF
#FI-CA
#IS-U-CS
#HTML-customer-informartion
#action-box-calls

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer