Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Security fix for user search program, SAP security note 1486835

Description

Due to a vulnerability which exists in the SRM-SUS tool for user determination, which is part of the SAP Supplier Relationship management (SAP SRM) solution, it is possible for a hacker to access restricted SAP transactions at runtime. This can lead to any or all of the following:

    1. Manipulation of Business Logic, resulting in inconsistent data states
    2. May lead ot violation of  regulatory compliance as this vulnerability allows for unprivileged access to critical business   logic.
Affected Releases:
  • SAP SRM 4.0
  • SAP SRM 5.0
  • SAP SRM 6.0
  • SAP SRM 7.0

Available fix and Supported packages

  • SRM_SERVER | 500 | 500
  • SRM_SERVER | 550 | 550
  • SRM_SERVER | 600 | 600
  • SRM_SERVER | 700 | 700
  • SRM_SERVER | 701 | 701
  • SRM_SERVER 600 | SAPKIBKU06 |
  • SRM_SERVER 550 | SAPKIBKT17 |
  • SRM_SERVER 701 | SAPK-70102INSRMSRV |
  • SRM_SERVER 500 | SAPKIBKS17 |
  • SRM_SERVER 700 | SAPKIBKV09 |

Affected component

    SRM-SUS-ADM
    Business Partner, User, Customizing

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1486835

TAGS

#SRM
#Supplier-Relationship-Management
#procurement
#E-Commerce
#Web
#&x00A0-&x00A0–business-to-business
#SAP-Business-to-Business-Procurement-BBP
#business-to-business
#e-business
#Ebusiness
#Internet
#EBP
#Enterprise-Buyer
#EnterpriseBuyer-professional-edition
#SRM_SERVER
#Security-Vulnerability
#Dynamic-Transaction-call.

More to explorer