Description
Due to an error in SEM-BPS, it is possible for an attacker to execute any user-defined source code. This enables the attacker to gain control over the system and obtain secure increased privileges.
Available fix and Supported packages
- SEM-BW | 400 | 400
- SEM-BW | 600 | 600
- SEM-BW | 700 | 700
- SEM-BW | 602 | 602
- SEM-BW | 603 | 603
- SEM-BW | 604 | 604
- SEM-BW | 605 | 605
- SEM-BW | 634 | 634
- SEM-BW 605 | SAPK-60502INSEMBW |
- SEM-BW 400 | SAPKGS4026 |
- SEM-BW 700 | SAPK-70013INSEMBW |
- SEM-BW 600 | SAPKGS6019 |
- SEM-BW 602 | SAPK-60209INSEMBW |
- SEM-BW 603 | SAPK-60308INSEMBW |
- SEM-BW 604 | SAPK-60409INSEMBW |
- SEM-BW 634 | SAPK-63401INSEMBW |
Affected component
- FIN-SEM-BPS-PLA
Planning Applications
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1505539