Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential reading or changing of data in FS-RI (Claims), SAP security note 1371602

Description

A malicious user can exploit FS-RI and use specially crafted inputs to disclose additional data or to modify data persisted in the database.
A hard-coded username can result in changes in the program’s behavior when a user is successfully authenticated with this username.
An error in FS-RI permits the reading and writing of arbitrary data using the network.
FS-RI contains ABAP code through which a malicious user can potentially inject and run their own code.

Available fix and Supported packages

  • FS-RI | 472 | 472
  • FS-RI | 600 | 600
  • FS-RI | 650 | 650
  • FS-RI | 660 | 660
  • FS-RI 472 | SAPK-47222INMSG |
  • FS-RI 600 | SAPK-60017INMSG |
  • FS-RI 660 | SAPK-66005INMSG |
  • FS-RI 650 | SAPK-65011INMSG |

Affected component

    FS-RI-CM
    Claims

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1371602

TAGS

#SQL-injectionDatabaseBackdoorHard-codedCredentialsDirectoryTraversalInjectionRun

More to explorer