Skip links

Information Disclosure in LaMa 3.0, SAP security note 2520772

Description

UPDATE 14th November 2017: This note has been re-released with updated CVSS Information and Priority.

Under certain conditions LaMa 3.0 allows an attacker with LaMa user or LaMa J2EE Database administrator rights to read passwords or confidential information of managed systems. The information disclosed is:

Hana MDC SYSTEM users passwords.

This may give an attacker the chance to connect to the Hana database and the Hana systemdb database.

The information is stored without encryption in the LaMa database. These passwords are visible by downloading the LaMa support information.

Note: Check Reasons and Prerequisites to see if the impact is relevant to your Lama Usage Scenario.

CVSS Information

CVSS v3 Base Score: 9.1 / 10
CVSS v3 Base Vector:

AV : Attack Vector (Related exploit range)

Network (N)

AC : Attack Complexity (Required attack complexity)

Low (L)

PR : Privileges Required (Level of privileges needed to exploit)

High (H)

UI : User Interaction (Required user participation)

None (N)

S : Scope (Change in scope due to impact caused to components beyond the vulnerable component)

Changed (C)

C : Impact to Confidentiality

High (H)

I : Impact to Integrity

High (H)

A : Impact to Availability

High (H)

SAP provides this CVSS v3 base score as an estimate of the risk posed by the issue reported in this note. This estimate does not take into account your own system configuration or operational environment. It is not intended to replace any risk assessments you are advised to conduct when deciding on the applicability or priority of this SAP security note. For more information, see the FAQ section at https://support.sap.com/securitynotes.

Available fix and Supported packages

  • VCM | 3.00 | 3.00
  • VCM LVM ENTERPRISE 3.0 | SP004 | 000001

Affected component

    BC-VCM-LVM
    Landscape Virtualization Management

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2520772

TAGS

#Information-Exposure
#Information-Leak
#Elevation-of-Privileges

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies