Skip links
🔥🔥🔥 Join us for our upcoming training session at Black Hat MEA: "Securing SAP Systems: Expert Insights and Penetration Testing Techniques" 🛡️🔍

Security gap in the Workflow Customizing, SAP security note 149344

Description

In the area of the Business Workflow, the automatic Customizing creates a user called WF-BACKGROUND. In the automatic customizing, the WF-BACKGROUND user receives the SAP_ALL and SAP_NEW authorization because all background steps are processed in the workflow under this user and it is not foreseeably clear which function this specifically concerns. The user type is ‘background’.
The security problem now is that each user administrator with the weaker S_A.ADMIN standard profile can create a ‘dialog user’ from the ‘background user’, which the SAP_ALL authorization provides him with indirectly.

Available fix and Supported packages

  • SAP_APPL | 40A | 40B
  • SAP_APPL | 45B | 45B
  • SAP_APPL 45B | SAPKH45B58 |

Affected component

    BC-BMT-WFM
    Business Workflow

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/149344

TAGS

#Security
#SAP_ALL

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer