Skip links
🔥🔥🔥 Join us for our upcoming training session at Black Hat MEA: "Securing SAP Systems: Expert Insights and Penetration Testing Techniques" 🛡️🔍

Potential disclosure & modification of persisted data in MPN, SAP security note 1493435

Description

A malicious user can exploit Manufacturer Part Number (MPN) and use specially crafted inputs to execute arbitrary database commands to retrieve, modify, or remove data persisted by the system.

Affected Releases:

  • SAP ECC 604
  • SAP ECC 605
  • SAP ECC 604
  • SAP ECC 603
  • SAP ECC 602
  • SAP ECC 600

Available fix and Supported packages

  • SAP_APPL | 600 | 600
  • SAP_APPL | 602 | 602
  • SAP_APPL | 603 | 603
  • SAP_APPL | 604 | 604
  • SAP_APPL | 605 | 605
  • SAP_APPL 605 | SAPKH60502 |
  • SAP_APPL 600 | SAPKH60019 |
  • SAP_APPL 602 | SAPKH60209 |
  • SAP_APPL 603 | SAPKH60308 |
  • SAP_APPL 604 | SAPKH60409 |

Affected component

    PSM-GPR-POR
    PPS Functions in Purchase Order

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1493435

TAGS

#SQL-injection
#Database
#Manufacturer-Part-Number
#MPN
#Procurement-for-Public-Sector
#Government-Procurement
#SRM.

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer