Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Code injection vulnerability/Missing Auth-check in SRM, SAP security note 1470350

Description

The Supplier Relationship Management solution contains code which allows to execute arbitrary program code of the user’s choice.
A malicious user can therefore control the behavior of the system or can potentially escalate privileges by executing malicious code without legitimate own credentials.

An authenticated user can use functionality of Supplier Relationship Management to which access should be restricted. This can potentially result in an Escalation of Privileges.

Available fix and Supported packages

  • SRM_SERVER | 550 | 550
  • SRM_SERVER | 600 | 600
  • SRM_SERVER | 700 | 700
  • SRM_SERVER | 701 | 701
  • SRM_EXT | 700 | 700
  • SRM_EXT | 701 | 701
  • SRM_SERVER 600 | SAPKIBKU06 |
  • SRM_SERVER 701 | SAPK-70102INSRMSRV |
  • SRM_SERVER 550 | SAPKIBKT18 |
  • SRM_SERVER 700 | SAPKIBKV10 |
  • SRM_EXT 701 | SAPK-70102INSRMEXT |
  • SRM_EXT 700 | SAPK-70010INSRMEXT |

Affected component

    SRM-EBP-PD
    Procurement Document Methods

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1470350

TAGS

#SRM
#Supplier-Relationship-Management
#procurement
#E-Commerce
#Web
#EBP
#SRM_SERVER
#Security-vulnerability
#Dynamic-Function-call
#Backdoor
#injection
#run
#credentials
#Authorization
#authorization-check

More to explorer

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.