Skip links

Unauthorized use of appl. functions in Transaction Launcher, SAP security note 1620942

Description

A malicious user can execute functions in the Transaction Launcher of WebClient UI Framework without authentication and authorization.

Available fix and Supported packages

  • SAP_ABA | 700 | 700
  • CRMUIF | 520 | 520
  • CRMUIF | 600 | 600
  • PI | 2004_1_46C | 2004_1_500
  • WEBCUIF | 700 | 700
  • WEBCUIF | 701 | 701
  • WEBCUIF | 731 | 731
  • WEBCUIF | 730 | 730
  • WEBCUIF | 746 | 746
  • SAP_ABA 700 | SAPKA70026 |
  • CRMUIF 520 | SAPK-52013INCRMUIF |
  • CRMUIF 600 | SAPK-60014INCRMUIF |
  • PI 2004_1_46C | SAPKIPZI4J |
  • PI 2004_1_470 | SAPKIPZI5J |
  • PI 2004_1_500 | SAPKIPZI6L |
  • WEBCUIF 700 | SAPK-70011INWEBCUIF |
  • WEBCUIF 701 | SAPK-70107INWEBCUIF |
  • WEBCUIF 730 | SAPK-73003INWEBCUIF |
  • WEBCUIF 731 | SAPK-73102INWEBCUIF |
  • WEBCUIF 746 | 746 |

Affected component

    CA-WUI-APF
    Application Frame

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1620942

TAGS

#Cross-site-request-forgery
#XSRF
#LTX
#Launch-Transaction

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,