Skip links
🔥🔥🔥 Join us for our upcoming training session at Black Hat MEA: "Securing SAP Systems: Expert Insights and Penetration Testing Techniques" 🛡️🔍

Update #1 to Security Note 1534608, SAP security note 1567038

Description

Even though Note 1534608 has been implemented, certain functions of Internet Application Component (IAC) postprocessing can be called by a user who is logged on, even if this user does not have the required authorizations.

Available fix and Supported packages

  • IS-M | 464 | 464
  • IS-M | 471 | 471
  • IS-M | 472 | 472
  • IS-M | 600 | 600
  • IS-M | 602 | 602
  • IS-M | 603 | 603
  • IS-M | 604 | 604
  • IS-M | 605 | 605
  • IS-M 464 | SAPKIPPL34 |
  • IS-M 605 | SAPK-60504INISM |
  • IS-M 471 | SAPKIPPM27 |
  • IS-M 472 | SAPKIPPN21 |
  • IS-M 600 | SAPK-60020INISM |
  • IS-M 602 | SAPK-60210INISM |
  • IS-M 603 | SAPK-60309INISM |
  • IS-M 604 | SAPK-60410INISM |

Affected component

    IS-M-SD-PS-SL-O
    Order

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1567038

TAGS

#Authorization
#authorization-checks

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer