Skip links

Unauthorized usage of application functionality in IS-HER-CM, SAP security note 1511062

Description

A malicious user can trigger functionality in IS-HER-CM without authentication and authorization.

Available fix and Supported packages

  • IS-PS-CA | 472 | 472
  • IS-PS-CA | 600 | 600
  • IS-PS-CA | 602 | 602
  • IS-PS-CA | 603 | 603
  • IS-PS-CA | 604 | 604
  • IS-PS-CA | 605 | 605
  • IS-PS-CA 472 | SAPKIPQH20 |
  • IS-PS-CA 600 | SAPK-60019INISPSCA |
  • IS-PS-CA 602 | SAPK-60209INISPSCA |
  • IS-PS-CA 603 | SAPK-60308INISPSCA |
  • IS-PS-CA 604 | SAPK-60409INISPSCA |
  • IS-PS-CA 605 | SAPK-60503INISPSCA |
  • IS-PS-CA 472 | SAPKIPQH21 |

Affected component

    IS-HER-CM
    Student Lifecycle Management

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1511062

TAGS

#Cross-Site-Request-Forgery
#XSRF
#IS-HER-CM

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies