Skip links

Unauthorized modification of stored content in CA-GTF-TS-WSI, SAP security note 1612819


CA-GTF-TS-WSI can be abused by a malicious user, allowing them to modify application content, persist the modified content without authorization, and to potentially obtain authentication information from other legitimate users.

Available fix and Supported packages

  • SAP_ABA | 640 | 640
  • SAP_ABA | 700 | 702
  • SAP_ABA 640 | SAPKA64030 |
  • SAP_ABA 700 | SAPKA70027 |
  • SAP_ABA 701 | SAPKA70112 |
  • SAP_ABA 702 | SAPKA70212 |

Affected component

    Catalog and Partner Interface Integration (OCI, OPI)


Score: 0


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.




How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies