Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Potential disclosure of persisted data in WEBCUIF, SAP security note 1470407

Description

A malicious user can exploit some of the Web UI Framework applications and features, and use specially crafted inputs to modify database commands, resulting in the retrieval of additional information persisted by the system. The following components are affected:

  • the SFLIGHT test application
  • the Business Role Customizing Tool application
  • the report CRM_GENIL_CUST_COPY2
  • classes CL_AXT_CHECK_TABLE_HANDLER, CL_CRM_UI_COMPONENT_PROFILE
  • Report CRM_THTMLB_UI_SEARCH

Available fix and Supported packages

  • CRMUIF | 520 | 520
  • CRMUIF | 600 | 600
  • WEBCUIF | 700 | 700
  • WEBCUIF | 701 | 701
  • WEBCUIF | 730 | 730
  • CRMUIF 520 | SAPK-52011INCRMUIF |
  • CRMUIF 600 | SAPK-60010INCRMUIF |
  • WEBCUIF 700 | SAPK-70007INWEBCUIF |
  • WEBCUIF 701 | SAPK-70102INWEBCUIF |
  • WEBCUIF 700 | SAPK-70008INWEBCUIF |
  • WEBCUIF 730 | 730 |

Affected component

    CA-WUI
    WebClient User Interface

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1470407

TAGS

#SQL-Injection
#WEBCUIF
#CRMUIF

Explore More

RedRays AI for ABAP Code Security

Empowering Secure, Efficient, and Compliant SAP ABAP Development—in Real Time and Without Data Retention In today’s rapidly evolving business landscape, organizations increasingly

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.