Skip links

Unauthorized usage of application functionality in WFM., SAP security note 1511031

Description

A malicious user can trigger functionality in CA-GTF-WFA (WFM)  without authentication and authorization.

Available fix and Supported packages

  • ISRWFM | 100 | 100
  • ISRWFM | 310 | 310
  • ITIMECLOCK | 200 | 200
  • ITIMECLOCK | 310 | 310
  • ISR WORKFORCE MANAGEMENT 1.0 | SP012 | 000000
  • ISR WORKFORCE MANAGEMENT 3.1 | SP006 | 000000
  • ITIME CLOCK SERVER 2.0 | SP012 | 000000
  • ITIME CLOCK SERVER 3.1 | SP006 | 000000

Affected component

    CA-GTF-WFA
    please use CRM-WFD(Workforce Management Application)

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1511031

TAGS

#Cross-Site-Request-Forgery
#XSRF
#CA-GTF-WFA
#WFM
#ITIMECLOCK
#Workforce-Management.

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies