Skip links

Unauthorized usage of functionality in workflow (ITS), SAP security note 1517963

Description

An attacker can trigger functionality in the Business Workflow area without the relevant authentication and authorization.

Available fix and Supported packages

  • SAP_BASIS | 640 | 640
  • SAP_BASIS | 700 | 702
  • SAP_BASIS | 710 | 730
  • SAP_BASIS 730 | SAPKB73002 |
  • SAP_BASIS 710 | SAPKB71012 |
  • SAP_BASIS 702 | SAPKB70207 |
  • SAP_BASIS 711 | SAPKB71107 |
  • SAP_BASIS 720 | SAPKB72005 |
  • SAP_BASIS 640 | SAPKB64028 |
  • SAP_BASIS 700 | SAPKB70024 |
  • SAP_BASIS 701 | SAPKB70109 |

Affected component

    BC-BMT-WFM-WEB
    Web Integration

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1517963

TAGS

#Cross-Site-Request-Forgery
#XSRF
#BWWI_EXECUTE
#BWWF_WI_DECI

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies