Skip links

Unauthorized modification of displayed content in BW, SAP security note 1514927

Description

The BW can be abused potential by a malicious user allowing them to modify displayed application content without authorization and to potentially obtain authentication information from other legitimate users.

Available fix and Supported packages

  • SAP_BW | 30B | 30B
  • SAP_BW | 310 | 310
  • SAP_BW | 350 | 350
  • SAP_BW | 700 | 702
  • SAP_BW | 710 | 730
  • SAP_BW | 72L | 73L
  • SAP_BW_VIRTUAL_COMP | 30B | 30B
  • SAP_BW_VIRTUAL_COMP | 701 | 701
  • SAP_BW 30B | SAPKW30B34 |
  • SAP_BW 310 | SAPKW31028 |
  • SAP_BW 700 | SAPKW70025 |
  • SAP_BW 701 | SAPKW70108 |
  • SAP_BW 730 | SAPKW73001 |
  • SAP_BW 730 | SAPKW73002 |
  • SAP_BW 702 | SAPKW70207 |
  • SAP_BW 711 | SAPKW71107 |
  • SAP_BW 350 | SAPKW35028 |
  • SAP_BW_VIRTUAL_COMP 701 | SAPK-70120INVCBWTECH |
  • SAP_BW_VIRTUAL_COMP 30B | SAPK-30B49INVCBWTECH |

Affected component

    BW-BEX-OT
    OLAP Technology

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1514927

TAGS

#Reflected-Cross-Site-Scripting
#XSS
#

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies