Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential reading or changing of data in FS-RI (Claims), SAP security note 1371602

Description

A malicious user can exploit FS-RI and use specially crafted inputs to disclose additional data or to modify data persisted in the database.
A hard-coded username can result in changes in the program’s behavior when a user is successfully authenticated with this username.
An error in FS-RI permits the reading and writing of arbitrary data using the network.
FS-RI contains ABAP code through which a malicious user can potentially inject and run their own code.

Available fix and Supported packages

  • FS-RI | 472 | 472
  • FS-RI | 600 | 600
  • FS-RI | 650 | 650
  • FS-RI | 660 | 660
  • FS-RI 472 | SAPK-47222INMSG |
  • FS-RI 600 | SAPK-60017INMSG |
  • FS-RI 660 | SAPK-66005INMSG |
  • FS-RI 650 | SAPK-65011INMSG |

Affected component

    FS-RI-CM
    Claims

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1371602

TAGS

#SQL-injectionDatabaseBackdoorHard-codedCredentialsDirectoryTraversalInjectionRun

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,

Protect Your SAP with RedRays Security Platform

Explore the Power of Our Scanner with an Interactive Prototype Below