Skip links

Unauthorized modification of displayed content – Vendor Eval, SAP security note 1491683

Description

The SRM BI Content BSP Application SRM_VE_SERVICE could be abused by a malicious user, who could modify displayed application content without authorization and potentially obtain authentication information from other legitimate users.

Available fix and Supported packages

  • BI_CONT | 353 | 353
  • BI_CONT | 704 | 704
  • BI_CONT | 705 | 705
  • BI_CONT | 735 | 735
  • BI_CONT 704 | SAPK-70410INBICONT |
  • BI_CONT 705 | SAPK-70502INBICONT |
  • BI_CONT 353 | SAPKIBIFR2 |

Affected component

    BW-BCT-BBP
    BW only – Business-to-Business Procurement

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1491683

TAGS

#Reflected-Cross-Site-Scripting
#XSS
#SRM-BI
#SRM-BI-Security
#Vendor-Evaluation
#SRM-VE
#SRM-BSP-Application
#SRM-BSP
#BSP-Application-SRM_VE_SERVICE
#SRM_VE_SERVICE

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies