Description
UPDATE 27th April 2021 : This note has been re-released with the updated ‘Support Packages & Patches’ information. The validity of the correction instruction extended to BW 7.40 SP3 and SP4
SAP Business Warehouse and SAP BW/4HANA allow a low privileged attacker to inject code using a remote enabled function module over the network. Due to a lack of input validation, an attacker, who was granted access (S_RFC) to execute the function module can inject malicious ABAP code, which will be saved persistently in a report in the ABAP repository.
This report can then be executed leading to Code injection vulnerability which can cause sensitive data loss, modification of critical data and even denial of service.
Available fix and Supported packages
- DW4CORE | 100 | 100
- DW4CORE | 200 | 200
- SAP_BW | 700 | 702
- SAP_BW | 711 | 711
- SAP_BW | 730 | 730
- SAP_BW | 731 | 731
- SAP_BW | 740 | 740
- SAP_BW | 750 | 755
- SAP_BW | 782 | 782
- DW4CORE 100 | SAPK-10019INDW4CORE |
- DW4CORE 200 | SAPK-20008INDW4CORE |
- SAP_BW 755 | SAPK-75501INSAPBW |
- SAP_BW 750 | SAPK-75020INSAPBW |
- SAP_BW 751 | SAPK-75112INSAPBW |
- | SAPK-783BHINSAPBW |
- SAP_BW 752 | SAPK-75208INSAPBW |
- SAP_BW 753 | SAPK-75306INSAPBW |
- SAP_BW 754 | SAPK-75404INSAPBW |
- SAP_BW 700 | SAPKW70041 |
- SAP_BW 701 | SAPKW70124 |
- SAP_BW 702 | SAPKW70224 |
- | SAPK-784BHINSAPBW |
- SAP_BW 731 | SAPKW73129 |
- SAP_BW 740 | SAPKW74026 |
- SAP_BW 782 | SAPK-78205INSAPBW |
Affected component
- BW-BEX-OT-DBIF
Interface to Database
CVSS
Score: 9.9
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/2999854