Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Unauthorized modification of content in transaction launcher, SAP security note 1674616

Description

When CRM Transaction launcher is used to launch the backend applications, the backend applications could be abused by a malicious user, who could modify application content, persist the modified content without authorization, and potentially obtain authentication information from other legitimate users.

Available fix and Supported packages

  • SAP_ABA | 700 | 700
  • CRMUIF | 600 | 600
  • PI | 2004_1_470 | 2004_1_500
  • WEBCUIF | 700 | 700
  • WEBCUIF | 701 | 701
  • WEBCUIF | 731 | 731
  • WEBCUIF | 730 | 730
  • WEBCUIF | 746 | 746
  • SAP_ABA 700 | SAPKA70027 |
  • CRMUIF 600 | SAPK-60015INCRMUIF |
  • PI 2004_1_470 | SAPKIPZI5J |
  • PI 2004_1_500 | SAPKIPZI6L |
  • WEBCUIF 731 | SAPK-73103INWEBCUIF |
  • WEBCUIF 700 | SAPK-70012INWEBCUIF |
  • WEBCUIF 701 | SAPK-70109INWEBCUIF |
  • WEBCUIF 730 | SAPK-73004INWEBCUIF |
  • WEBCUIF 731 | SAPK-73104INWEBCUIF |
  • WEBCUIF 746 | 746 |

Affected component

    CA-WUI-APF
    Application Frame

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1674616

TAGS

#Stored-Cross-Site-Scripting
#XSS
#IC_LTX
#IC_LTXE
#IC_LTXR

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,

Protect Your SAP with RedRays Security Platform

Explore the Power of Our Scanner with an Interactive Prototype Below