Skip links

Unauthorized execution of application funcs. in BW-PLA-BPS, SAP security note 1694226

Description

An attacker can execute functions in BW-PLA-BPS without authentication and authorization.

Available fix and Supported packages

  • SAP_BW | 350 | 350
  • SAP_BW | 700 | 702
  • SAP_BW | 710 | 730
  • SAP_BW | 731 | 731
  • SAP_BW_VIRTUAL_COMP | 701 | 701
  • SAP_BW 350 | SAPKW35030 |
  • SAP_BW 700 | SAPKW70029 |
  • SAP_BW 701 | SAPKW70112 |
  • SAP_BW 711 | SAPKW71110 |
  • SAP_BW 720 | SAPKW72008 |
  • SAP_BW 702 | SAPKW70212 |
  • SAP_BW 730 | SAPKW73008 |
  • SAP_BW 731 | SAPKW73104 |
  • SAP_BW_VIRTUAL_COMP 701 | SAPK-70133INVCBWTECH |

Affected component

    BW-PLA-BPS-WIB
    Web Interface Builder / Runtime

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1694226

TAGS

#Cross-site-request-forgery
#XSRF
#BW-PLA-BPS

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies

SAP Security Patch Day RedRays

May 2024 SAP Security Patch Day

Vulnerability: Multiple vulnerabilities in SAP CX Commerce SAP Component: CEC-SCC-PLA-PL CVE ID: CVE-2019-17495 CVSS Score: 9.8 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Category: Program error