Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Unauthorized use of application functions in IS-AFS, SAP security note 1525149

Description

A malicious user can execute functions in IS-AFS without authentication and authorization.

Available fix and Supported packages

  • P3A | V500 | V500
  • P3A | V600 | V600
  • P3A | V603 | V603
  • P3A | V604 | V604
  • P3A | V605 | V605
  • P3A V604 | SAPK-60404INP3A |
  • P3A V500 | SAPKIAF513 |
  • P3A V603 | SAPK-60307INP3A |
  • P3A V600 | SAPK-60011INAFS |
  • P3A V605 | SAPK-60501INP3A |

Affected component

    IS-AFS-MM
    AFS Materials Management

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1525149

TAGS

#Cross-site-request-forgery
#XSRF
#IS-AFS

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,

Protect Your SAP with RedRays Security Platform

Explore the Power of Our Scanner with an Interactive Prototype Below