Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Code injection vulnerability/Missing Auth-check in SRM, SAP security note 1470350

Description

The Supplier Relationship Management solution contains code which allows to execute arbitrary program code of the user’s choice.
A malicious user can therefore control the behavior of the system or can potentially escalate privileges by executing malicious code without legitimate own credentials.

An authenticated user can use functionality of Supplier Relationship Management to which access should be restricted. This can potentially result in an Escalation of Privileges.

Available fix and Supported packages

  • SRM_SERVER | 550 | 550
  • SRM_SERVER | 600 | 600
  • SRM_SERVER | 700 | 700
  • SRM_SERVER | 701 | 701
  • SRM_EXT | 700 | 700
  • SRM_EXT | 701 | 701
  • SRM_SERVER 600 | SAPKIBKU06 |
  • SRM_SERVER 701 | SAPK-70102INSRMSRV |
  • SRM_SERVER 550 | SAPKIBKT18 |
  • SRM_SERVER 700 | SAPKIBKV10 |
  • SRM_EXT 701 | SAPK-70102INSRMEXT |
  • SRM_EXT 700 | SAPK-70010INSRMEXT |

Affected component

    SRM-EBP-PD
    Procurement Document Methods

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1470350

TAGS

#SRM
#Supplier-Relationship-Management
#procurement
#E-Commerce
#Web
#EBP
#SRM_SERVER
#Security-vulnerability
#Dynamic-Function-call
#Backdoor
#injection
#run
#credentials
#Authorization
#authorization-check

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,