Skip links

Potential modif. or disclosure of data in SAP SNC, SAP security note 1493519

Description

A malicious user can exploit SAP SNC and use specially crafted inputs to modify data-base commands, resulting in either the retrieval of additional information or modification of data persisted by the system.

Available fix and Supported packages

  • SCM | 410 | 410
  • SCM | 500 | 500
  • SCM | 510 | 510
  • SCM | 700 | 700
  • SCM | 701 | 701
  • SCM 701 | SAPKY70102 |
  • SCM 410 | SAPKY41021 |
  • SCM 500 | SAPKY50019 |
  • SCM 510 | SAPKY51015 |
  • SCM 700 | SAPKY70009 |

Affected component

    SCM-APO-MD
    Master Data

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1493519

TAGS

#SQL-injection
#database.

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies

SAP Security Patch Day RedRays

May 2024 SAP Security Patch Day

Vulnerability: Multiple vulnerabilities in SAP CX Commerce SAP Component: CEC-SCC-PLA-PL CVE ID: CVE-2019-17495 CVSS Score: 9.8 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Category: Program error