Skip links

Missing authorization check in the telnet command password, SAP security note 1782955

Description

An authenticated user can use the password telnet command, to which access should be restricted. This may result in exceeding user privileges.

Available fix and Supported packages

  • SAP-JEE | 6.40 | 6.40
  • SAP-JEECOR | 7.00 | 7.00
  • SAP-JEECOR | 6.40 | 6.40
  • SAP-JEECOR | 7.01 | 7.02
  • SERVERCORE | 7.10 | 7.10
  • SERVERCORE | 7.11 | 7.11
  • SERVERCORE | 7.20 | 7.20
  • SERVERCORE | 7.30 | 7.30
  • SERVERCORE | 7.31 | 7.31
  • J2EE ENGINE SERVERCORE 7.10 | SP013 | 000020
  • J2EE ENGINE SERVERCORE 7.10 | SP014 | 000022
  • J2EE ENGINE SERVERCORE 7.10 | SP015 | 000005
  • J2EE ENGINE SERVERCORE 7.10 | SP016 | 000001
  • J2EE ENGINE SERVERCORE 7.10 | SP017 | 000000
  • J2EE ENGINE SERVERCORE 7.11 | SP008 | 000026
  • J2EE ENGINE SERVERCORE 7.11 | SP009 | 000026
  • J2EE ENGINE SERVERCORE 7.11 | SP010 | 000010
  • J2EE ENGINE SERVERCORE 7.11 | SP011 | 000003
  • J2EE ENGINE SERVERCORE 7.11 | SP012 | 000000
  • J2EE ENGINE SERVERCORE 7.20 | SP005 | 000048
  • J2EE ENGINE SERVERCORE 7.20 | SP006 | 000033
  • J2EE ENGINE SERVERCORE 7.20 | SP007 | 000028
  • J2EE ENGINE SERVERCORE 7.20 | SP008 | 000008
  • J2EE ENGINE SERVERCORE 7.20 | SP009 | 000000
  • J2EE ENGINE SERVERCORE 7.30 | SP004 | 000032
  • J2EE ENGINE SERVERCORE 7.30 | SP005 | 000048
  • J2EE ENGINE SERVERCORE 7.30 | SP007 | 000036
  • J2EE ENGINE SERVERCORE 7.30 | SP008 | 000003
  • J2EE ENGINE SERVERCORE 7.30 | SP009 | 000000

Affected component

    BC-JAS-SEC
    Security, User Management

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1782955

TAGS

#Authorization
#authorization-check
#password-telnet-command

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies