Description
UPDATE 14th November 2017: This note has been re-released with updated CVSS Information and Priority.
Under certain conditions LaMa 3.0 allows an attacker with LaMa user or LaMa J2EE Database administrator rights to read passwords or confidential information of managed systems. The information disclosed is:
Hana MDC SYSTEM users passwords.
This may give an attacker the chance to connect to the Hana database and the Hana systemdb database.
The information is stored without encryption in the LaMa database. These passwords are visible by downloading the LaMa support information.
Note: Check Reasons and Prerequisites to see if the impact is relevant to your Lama Usage Scenario.
CVSS Information
CVSS v3 Base Score: 9.1 / 10
CVSS v3 Base Vector:
AV : Attack Vector (Related exploit range) |
Network (N) |
AC : Attack Complexity (Required attack complexity) |
Low (L) |
PR : Privileges Required (Level of privileges needed to exploit) |
High (H) |
UI : User Interaction (Required user participation) |
None (N) |
S : Scope (Change in scope due to impact caused to components beyond the vulnerable component) |
Changed (C) |
C : Impact to Confidentiality |
High (H) |
I : Impact to Integrity |
High (H) |
A : Impact to Availability |
High (H) |
SAP provides this CVSS v3 base score as an estimate of the risk posed by the issue reported in this note. This estimate does not take into account your own system configuration or operational environment. It is not intended to replace any risk assessments you are advised to conduct when deciding on the applicability or priority of this SAP security note. For more information, see the FAQ section at https://support.sap.com/securitynotes.
Available fix and Supported packages
- VCM | 3.00 | 3.00
- VCM LVM ENTERPRISE 3.0 | SP004 | 000001
Affected component
- BC-VCM-LVM
Landscape Virtualization Management
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/2520772