Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Unauthorized use of application functions in BW-BCT-CRM-RTOM, SAP security note 1624909

Description

A malicious user can execute functions in BW-BCT-CRM-RTOM without authentication and authorization.

Available fix and Supported packages

  • BI_CONT | 703 | 703
  • BI_CONT | 704 | 704
  • BI_CONT | 705 | 705
  • BI_CONT | 706 | 706
  • BI_CONT | 711 | 711
  • BI_CONT | 735 | 735
  • BI_CONT | 736 | 736
  • BI_CONT | 746 | 746
  • BI_CONT 736 | SAPK-73601INBICONT |
  • BI_CONT 746 | SAPK-74601INBICONT |
  • BI_CONT 706 | SAPK-70603INBICONT |
  • BI_CONT 705 | SAPK-70507INBICONT |
  • BI_CONT 735 | SAPK-73506INBICONT |

Affected component

    BW-BCT-CRM-RTOM
    BW only – CRM Real-time offer management reports

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1624909

TAGS

#Cross-site-request-forgery
#XSRF
#BW-BCT-CRM-RTOM

Explore More

RedRays AI for ABAP Code Security

Empowering Secure, Efficient, and Compliant SAP ABAP Development—in Real Time and Without Data Retention In today’s rapidly evolving business landscape, organizations increasingly

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.