Description
This security note has been updated. For more detailed information, see security note 2102941.
When you use a synchronous RFC in ABAP, you can, from the context of the remote (called) function module, use the RFC destination "BACK" to execute remote-enabled modules in the context of the RFC caller if the RFC caller has the necessary RFC authorizations and the callback is not prohibited by the previous call of the function module RFC_CALLBACK_REJECTED (see SAP Note 1515925).
CVSS information
CVSS Base Score: 6.0
CVSS Base Vector: AV:N/AC:M/AU:S/C:P/I:P/A:P
This CVSS Base Score provided by SAP is used to estimate the risk posed by the issue reported in this SAP Note. However, this estimate does not take into account your own system configuration or operational environment. It is not intended to replace any risk assessments that you are advised to conduct when deciding on the applicability or priority of this SAP security note. For more information, see "FAQs" at https://service.sap.com/securitynotes/.
Available fix and Supported packages
- KRNL32NUC | 6.40 | 6.40EX2
- KRNL32NUC | 7.20 | 7.20
- KRNL32NUC | 7.20EXT | 7.20EXT
- KRNL32NUC | 7.21 | 7.21
- KRNL32NUC | 7.21EXT | 7.21EXT
- KRNL32UC | 6.40 | 6.40EX2
- KRNL32UC | 7.20 | 7.20
- KRNL32UC | 7.20EXT | 7.20EXT
- KRNL32UC | 7.21 | 7.21
- KRNL32UC | 7.21EXT | 7.21EXT
- KRNL64NUC | 6.40 | 6.40EX2
- KRNL64NUC | 7.20 | 7.20
- KRNL64NUC | 7.20EXT | 7.20EXT
- KRNL64NUC | 7.21 | 7.21
- KRNL64NUC | 7.21EXT | 7.21EXT
- KRNL64NUC | 7.38 | 7.38
- KRNL64NUC | 7.40 | 7.40
- KRNL64NUC | 7.41 | 7.41
- KRNL64NUC | 7.42 | 7.42
- KRNL64UC | 6.40 | 6.40EX2
- SAP_BASIS 720 | SAPKB72008 |
- SAP_BASIS 731 | SAPKB73104 |
- SAP_BASIS 700 | SAPKB70028 |
- SAP_BASIS 710 | SAPKB71016 |
- SAP_BASIS 701 | SAPKB70113 |
- SAP_BASIS 711 | SAPKB71111 |
- SAP_BASIS 702 | SAPKB70213 |
- SAP_BASIS 620 | SAPKB62074 |
- SAP_BASIS 640 | SAPKB64032 |
- SAP_BASIS 730 | SAPKB73011 |
- SAP_BASIS 731 | SAPKB73110 |
- SAP_BASIS 710 | SAPKB71019 |
- SAP_BASIS 711 | SAPKB71114 |
- SAP_BASIS 730 | SAPKB73012 |
- SAP_BASIS 740 | SAPKB74007 |
- SAP_BASIS 731 | SAPKB73113 |
- SAP_BASIS 700 | SAPKB70032 |
- SAP_BASIS 701 | SAPKB70117 |
- SAP_BASIS 702 | SAPKB70217 |
- SAP KERNEL 6.40 32-BIT | SP422 | 000422
- SAP KERNEL 6.40 32-BIT UNICODE | SP422 | 000422
- SAP KERNEL 6.40 64-BIT | SP422 | 000422
- SAP KERNEL 6.40 64-BIT UNICODE | SP422 | 000422
- SAP KERNEL 6.40_EX2 32-BIT | SP422 | 000422
- SAP KERNEL 6.40_EX2 32-BIT UC | SP422 | 000422
- SAP KERNEL 6.40_EX2 64-BIT | SP422 | 000422
- SAP KERNEL 6.40_EX2 64-BIT UC | SP422 | 000422
- SAP KERNEL 7.11 32-BIT | SP168 | 000168
- SAP KERNEL 7.11 32-BIT UNICODE | SP168 | 000168
- SAP KERNEL 7.11 64-BIT | SP168 | 000168
- SAP KERNEL 7.11 64-BIT UNICODE | SP168 | 000168
- SAP KERNEL 7.20 32-BIT | SP217 | 000217
- SAP KERNEL 7.20 32-BIT UNICODE | SP217 | 000217
- SAP KERNEL 7.20 64-BIT | SP217 | 000217
- SAP KERNEL 7.20 64-BIT UNICODE | SP217 | 000217
- SAP KERNEL 7.21 32-BIT | SP010 | 000010
- SAP KERNEL 7.21 32-BIT | SP133 | 000133
- SAP KERNEL 7.21 32-BIT UNICODE | SP010 | 000010
- SAP KERNEL 7.21 32-BIT UNICODE | SP133 | 000133
Affected component
- BC-MID-RFC
RFC
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1686632