Description
PPM-PFM can be abused by an attacker, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users.Also an URL-parameter NO_AUTH_CHECK, that seems to switch off any authorization checks, is rather suspicious in PPM. This means that any malicious user can simply add this parameter to a URL to bypass the authority checks.
Available fix and Supported packages
- CPRXRPM | 500_702 | 500_702
- CPRXRPM 500_702 | SAPK-50009INCPRXRPM |
Affected component
- PPM-PFM
Portfolio Management
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1687863