Skip links
Picture of Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Unauthorized modification in BSP application in FIN-SEM-CPM, SAP security note 1678643

Description

FIN-SEM-CPM can be abused by a malicious user, allowing them to modify displayed application content without authorization, and to potentially obtain authentification information from other legitimate users.

Available fix and Supported packages

  • SEM-BW | 600 | 600
  • SEM-BW | 700 | 700
  • SEM-BW | 602 | 602
  • SEM-BW | 603 | 603
  • SEM-BW | 604 | 604
  • SEM-BW | 605 | 605
  • SEM-BW | 736 | 736
  • SEM-BW | 634 | 634
  • SEM-BW | 746 | 746
  • SEM-BW 700 | SAPK-70019INSEMBW |
  • SEM-BW 736 | SAPK-73603INSEMBW |
  • SEM-BW 600 | SAPKGS6022 |
  • SEM-BW 602 | SAPK-60212INSEMBW |
  • SEM-BW 603 | SAPK-60311INSEMBW |
  • SEM-BW 604 | SAPK-60412INSEMBW |
  • SEM-BW 634 | SAPK-63404INSEMBW |
  • SEM-BW 605 | SAPK-60509INSEMBW |
  • SEM-BW 746 | 746 |

Affected component

    FIN-SEM-CPM-BSC
    Balanced Scorecard

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1678643

TAGS

#Cross-site-scripting
#XSS
#FIN-SEM-CPM

Explore More

SAP Security Patch Day – August 2025

SAP has released its August 2025 security patch package containing 19 security notes addressing critical vulnerabilities across enterprise SAP environments. This release

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.