Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Security gap in the Workflow Customizing, SAP security note 149344


In the area of the Business Workflow, the automatic Customizing creates a user called WF-BACKGROUND. In the automatic customizing, the WF-BACKGROUND user receives the SAP_ALL and SAP_NEW authorization because all background steps are processed in the workflow under this user and it is not foreseeably clear which function this specifically concerns. The user type is ‘background’.
The security problem now is that each user administrator with the weaker S_A.ADMIN standard profile can create a ‘dialog user’ from the ‘background user’, which the SAP_ALL authorization provides him with indirectly.

Available fix and Supported packages

  • SAP_APPL | 40A | 40B
  • SAP_APPL | 45B | 45B
  • SAP_APPL 45B | SAPKH45B58 |

Affected component

    Business Workflow


Score: 0


Exploit is not available.
For detailed information please contact the mail [email protected].




More to explorer

SAP Security For All

RedRays Security Platform for Penetration testers and Bug hunters

The product package is specifically created for cyber security experts who have encountered SAP while participating in bug bounty programs.

RedRays Security Platform for SAP Consultants

The product package is designed for SAP consultants conducting security assessments of SAP ERP systems. We provide essential tools and resources to help professionals in this field conduct their work effectively.

RedRays Security Platform for Enterprises

The product package is specifically optimized to cater to the needs of both small/medium and large companies who are seeking to streamline the process of organizing a comprehensive security system for ERP systems.