Skip links
🔥🔥🔥 Join us for our upcoming training session at Black Hat MEA: "Securing SAP Systems: Expert Insights and Penetration Testing Techniques" 🛡️🔍

Unauthorized use of application functionality in CA-GTF-RCM, SAP security note 1588241

Description

A malicious user can trigger functionality in CA-GTF-RCM without authentication and authorization.

Available fix and Supported packages

  • SAP_ABA | 640 | 640
  • SAP_ABA | 700 | 702
  • SAP_ABA | 710 | 730
  • SAP_ABA | 731 | 731
  • SAP_ABA 640 | SAPKA64029 |
  • SAP_ABA 700 | SAPKA70026 |
  • SAP_ABA 701 | SAPKA70111 |
  • SAP_ABA 702 | SAPKA70210 |
  • SAP_ABA 730 | SAPKA73005 |
  • SAP_ABA 731 | SAPKA73102 |
  • SAP_ABA 710 | SAPKA71014 |
  • SAP_ABA 711 | SAPKA71109 |
  • SAP_ABA 720 | SAPKA72007 |

Affected component

    CA-GTF-RCM
    Records and Case Management

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1588241

TAGS

#Cross-Site-Request-forgery
#CA-GTF-RCM
#XSRF

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer