Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Unauthorized code execution in Edit Locally, SAP security note 1535140

Description

A malicious user can execute arbitrary code with the edit locally component.

Available fix and Supported packages

  • KMC-CM | 7.00 | 7.02
  • KMC-CM | 7.30 | 7.30
  • EP-CM | 6.0_640 | 6.0_640
  • CM+COLLABORATION 6.0_640 | SP025 | 000007
  • CM+COLLABORATION 6.0_640 | SP026 | 000007
  • CM+COLLABORATION 6.0_640 | SP027 | 000004
  • CM+COLLABORATION 6.0_640 | SP028 | 000001
  • CM+COLLABORATION 6.0_640 | SP029 | 000000
  • KMC CONTENT MANAGEMENT 7.00 | SP021 | 000008
  • KMC CONTENT MANAGEMENT 7.00 | SP022 | 000006
  • KMC CONTENT MANAGEMENT 7.00 | SP023 | 000003
  • KMC CONTENT MANAGEMENT 7.00 | SP024 | 000001
  • KMC CONTENT MANAGEMENT 7.00 | SP025 | 000001
  • KMC CONTENT MANAGEMENT 7.00 | SP026 | 000000
  • KMC CONTENT MANAGEMENT 7.01 | SP006 | 000006
  • KMC CONTENT MANAGEMENT 7.01 | SP007 | 000005
  • KMC CONTENT MANAGEMENT 7.01 | SP008 | 000004
  • KMC CONTENT MANAGEMENT 7.01 | SP009 | 000002
  • KMC CONTENT MANAGEMENT 7.01 | SP010 | 000001
  • KMC CONTENT MANAGEMENT 7.01 | SP011 | 000000
  • KMC CONTENT MANAGEMENT 7.02 | SP004 | 000004
  • KMC CONTENT MANAGEMENT 7.02 | SP005 | 000002
  • KMC CONTENT MANAGEMENT 7.02 | SP006 | 000004

Affected component

    EP-KM-CM-UI
    CM User Interface

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1535140

TAGS

#injection
#run
#edit-locally

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,

Protect Your SAP with RedRays Security Platform

Explore the Power of Our Scanner with an Interactive Prototype Below