Skip links
Picture of Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Potential reading or changing of data in FS-RI (Claims), SAP security note 1371602

Description

A malicious user can exploit FS-RI and use specially crafted inputs to disclose additional data or to modify data persisted in the database.
A hard-coded username can result in changes in the program’s behavior when a user is successfully authenticated with this username.
An error in FS-RI permits the reading and writing of arbitrary data using the network.
FS-RI contains ABAP code through which a malicious user can potentially inject and run their own code.

Available fix and Supported packages

  • FS-RI | 472 | 472
  • FS-RI | 600 | 600
  • FS-RI | 650 | 650
  • FS-RI | 660 | 660
  • FS-RI 472 | SAPK-47222INMSG |
  • FS-RI 600 | SAPK-60017INMSG |
  • FS-RI 660 | SAPK-66005INMSG |
  • FS-RI 650 | SAPK-65011INMSG |

Affected component

    FS-RI-CM
    Claims

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1371602

TAGS

#SQL-injectionDatabaseBackdoorHard-codedCredentialsDirectoryTraversalInjectionRun

Explore More

SAP Security Patch Day – September 2025

SAP has released its September 2025 security patch package containing 26 security notes addressing critical vulnerabilities across enterprise SAP environments. This release

SAP Security Patch Day – August 2025

SAP has released its August 2025 security patch package containing 19 security notes addressing critical vulnerabilities across enterprise SAP environments. This release