SRM-LA can be used for phishing attacks by allowing an attacker to publish a URL purporting to be from the product, which redirects the victim to a URL chosen by the attacker.
This enables an attacker to falsely gain the trust of a victim and elicit private data from them (such as authentication information).
CVSS Base Score: 5.0
CVSS Base Vector: AV:N/AC:L/AU:N/C:P/I:N/A:N
SAP provides this CVSS base score as an estimate of the risk posed by the issue reported in this note. This estimate does not take into account your own system configuration or operational environment. It is not intended to replace any risk assessments you are advised to conduct when deciding on the applicability or priority of this SAP security note. For more information, see the FAQ section at https://service.sap.com/securitynotes/.
Available fix and Supported packages
- SRM_SERVER | 550 | 550
- SRM_SERVER | 600 | 600
- SRM_SERVER | 700 | 700
- SRM_SERVER | 701 | 701
- SRM_SERVER | 702 | 702
- SRM_SERVER | 713 | 713
Exploit is not available.
For detailed information please contact the mail [email protected].