Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Insecure default configuration of ACLs in KM, SAP security note 1499993

Description

#After installation, all KM repositories and their subfolders have the default permission #Everyone: Full Control#. Since all users belong to the Everyone-user-group by default, it may allow newly registered users to access and compromise the repositories and documents.

CVSS Information

CVSS Base Score: 6.5
CVSS Base Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

SAP is providing this CVSS base score as an estimate of the risk posed by the issue reported in this note. This estimate does not take into consideration your own system configuration, or operational environment. It is not intended to replace any risk assessments you are advised to conduct when deciding the applicability or priority of this SAP security note. Please see the FAQ section on https://service.sap.com/securitynotes/ for more information.

Available fix and Supported packages

  • LM-PORTAL | 7.30 | 7.30
  • KMC-BC | 7.00 | 7.02
  • KMC-CM | 7.00 | 7.02
  • KMC-COLL | 7.00 | 7.02
  • LMCFG | 7.30 | 7.30
  • EP-CM | 6.0_640 | 6.0_640
  • LIFECYCLE MGMT PORTAL 7.30 | SP001 | 000001
  • LIFECYCLE MGMT PORTAL 7.30 | SP002 | 000000

Affected component

    EP-KM-ADM
    System Administration

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1499993

TAGS

#KM-System-Administration

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,