Skip links

Executing freely determined code using transaction SE37, SAP security note 1511107

Description

Using a function module of the CO, an attacker can execute any user-defined source code.  As a result, the attacker can gain control over the system and obtain increased privileges.

Available fix and Supported packages

  • SAP_APPL | 31I | 31I
  • SAP_APPL | 40A | 40B
  • SAP_APPL | 45A | 45B
  • SAP_APPL | 46A | 46B
  • SAP_APPL | 46C | 46C
  • SAP_APPL | 470 | 470
  • SAP_APPL | 500 | 500
  • SAP_APPL | 600 | 600
  • SAP_APPL | 602 | 602
  • SAP_APPL | 603 | 603
  • SAP_APPL | 604 | 604
  • SAP_APPL | 605 | 605
  • SAP_APPL 31I | SAPKH31IB9 |
  • SAP_APPL 40B | SAPKH40B89 |
  • SAP_APPL 45B | SAPKH45B67 |
  • SAP_APPL 46B | SAPKH46B62 |
  • SAP_APPL 470 | SAPKH47035 |
  • SAP_APPL 500 | SAPKH50024 |
  • SAP_APPL 600 | SAPKH60019 |
  • SAP_APPL 602 | SAPKH60209 |
  • SAP_APPL 603 | SAPKH60308 |
  • SAP_APPL 604 | SAPKH60409 |
  • SAP_APPL 46C | SAPKH46C62 |
  • SAP_APPL 605 | SAPKH60503 |

Affected component

    CO-OM
    Overhead Cost Controlling

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1511107

TAGS

#Backdoor
#injection