First published: Sun Sep 17 2017(Updated: )
An issue was discovered in SAP E-Recruiting (aka ERECRUIT) 605 through 617. When an external applicant registers to the E-Recruiting application, he/she receives a link by email to confirm access to the provided email address. However, this measure can be bypassed and attackers can register and confirm email addresses that they do not have access to (candidate_hrobject is predictable and corr_act_guid is improperly validated). Furthermore, since an email address can be registered only once, an attacker could prevent other legitimate users from registering. This is SAP Security Note 2507798.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP E-Recruiting | =605 | |
SAP E-Recruiting | =606 | |
SAP E-Recruiting | =616 | |
SAP E-Recruiting | =617 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14511 is classified as a medium-severity vulnerability due to the potential for unauthorized access.
To mitigate CVE-2017-14511, it is recommended to apply the latest security patches released by SAP for versions 605 to 617.
CVE-2017-14511 affects SAP E-Recruiting versions 605, 606, 616, and 617.
CVE-2017-14511 is an email verification bypass vulnerability that allows unauthorized registration.
The risks associated with CVE-2017-14511 include potential unauthorized access to sensitive recruitment workflows and data.