Description
Every RFC function call requires a logon to the called system. As long as the RFC connection was defined as trust (transaction SM59, “Logon & Security” tab page), the target system checks in addition to the S_RFC for the requested function an authorization for the object S_RCFACL. For which user these checks are carried out depends on the definition in the RFC connection.
Entries in the fields RFC_SYSID, RFC_CLIENT or RFC_USER to S_RFCACL define from which systems, clients, or for which user IDs logons to the target system are accepted. If you enter the full authorization (*) in one or more of these three fields, you allow the logon from any system, client, or any user, and as a result, you may produce significant security risks.
Available fix and Supported packages
- SAP_BASIS | 46C | 46C
- SAP_BASIS | 620 | 640
- SAP_BASIS | 700 | 702
- SAP_BASIS | 710 | 730
- SAP_BASIS | 731 | 731
- SAP_BASIS 720 | SAPKB72008 |
- SAP_BASIS 730 | SAPKB73009 |
- SAP_BASIS 620 | SAPKB62074 |
- SAP_BASIS 46C | SAPKB46C66 |
- SAP_BASIS 640 | SAPKB64032 |
- SAP_BASIS 700 | SAPKB70029 |
- SAP_BASIS 731 | SAPKB73107 |
- SAP_BASIS 710 | SAPKB71017 |
- SAP_BASIS 701 | SAPKB70114 |
- SAP_BASIS 711 | SAPKB71112 |
- SAP_BASIS 702 | SAPKB70214 |
Affected component
- BC-SEC-AUT-PFC
ABAP Authorization and Role Administration
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1416085