The SRM logon page can be abused by an attacker, allowing them to modify application content, persist the modified content without authorization, and to potentially obtain authentication information from other legitimate users.
Available fix and Supported packages
- SRM_SERVER | 500 | 500
- SRM_SERVER | 550 | 550
- SRM_SERVER 550 | SAPKIBKT21 |
- SRM_SERVER 500 | SAPKIBKS19 |
ITS and Web files
Exploit is not available.
For detailed information please contact the mail [email protected].