Description
In Guided Procedures (GP) WSDLs, there are problems with authorization and authentication checks if
certain HTTP methods are used.
An attacker can control the behavior of the system, or potentially escalate privileges by
executing malicious code, without having legitimate credentials.
Available fix and Supported packages
- SAP-EU | 7.00 | 7.02
- GP-CORE | 7.10 | 7.11
- GP-CORE | 7.20 | 7.20
- GP-CORE | 7.30 | 7.30
- GP-CORE | 7.31 | 7.31
- CAF EU 7.00 | SP022 | 000005
- CAF EU 7.00 | SP023 | 000001
- CAF EU 7.00 | SP024 | 000002
- CAF EU 7.00 | SP025 | 000001
- CAF EU 7.00 | SP026 | 000000
- CAF EU 7.01 | SP006 | 000001
- CAF EU 7.01 | SP007 | 000001
- CAF EU 7.01 | SP008 | 000001
- CAF EU 7.01 | SP009 | 000001
- CAF EU 7.01 | SP010 | 000001
- CAF EU 7.01 | SP011 | 000000
- CAF EU 7.02 | SP003 | 000001
- CAF EU 7.02 | SP004 | 000001
- CAF EU 7.02 | SP005 | 000001
- CAF EU 7.02 | SP006 | 000001
- CAF EU 7.02 | SP007 | 000001
- CAF EU 7.02 | SP008 | 000001
- CAF EU 7.02 | SP009 | 000001
- CAF EU 7.02 | SP010 | 000000
- CAF EU 7.02 | SP011 | 000000
Affected component
- BC-GP
Guided Procedures
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1625893