Skip links

Security gap in the Workflow Customizing, SAP security note 149344


In the area of the Business Workflow, the automatic Customizing creates a user called WF-BACKGROUND. In the automatic customizing, the WF-BACKGROUND user receives the SAP_ALL and SAP_NEW authorization because all background steps are processed in the workflow under this user and it is not foreseeably clear which function this specifically concerns. The user type is ‘background’.
The security problem now is that each user administrator with the weaker S_A.ADMIN standard profile can create a ‘dialog user’ from the ‘background user’, which the SAP_ALL authorization provides him with indirectly.

Available fix and Supported packages

  • SAP_APPL | 40A | 40B
  • SAP_APPL | 45B | 45B
  • SAP_APPL 45B | SAPKH45B58 |

Affected component

    Business Workflow


Score: 0


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.




How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies

SAP Security Patch Day RedRays

May 2024 SAP Security Patch Day

Vulnerability: Multiple vulnerabilities in SAP CX Commerce SAP Component: CEC-SCC-PLA-PL CVE ID: CVE-2019-17495 CVSS Score: 9.8 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Category: Program error