Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Potential disclosure of data in FM /SAPAPO/APX_GET_ANY_TABLE, SAP security note 1494228

Description

A malicious user can exploit FM /SAPAPO/APX_GET_ANY_TABLE and use specially crafted inputs to execute arbitrary database commands to retrieve, modify, or remove data persisted by the system.

Available fix and Supported packages

  • SAP_APO | 30A | 30A
  • SAP_APO | 310 | 310
  • SCM | 400 | 400
  • SCM | 410 | 410
  • SCM | 500 | 500
  • SCM | 510 | 510
  • SCM | 700 | 700
  • SCM | 701 | 701
  • SAP_APO 30A | SAPKY30A32 |
  • SAP_APO 310 | SAPKY31027 |
  • SCM 400 | SAPKY40022 |
  • SCM 410 | SAPKY41021 |
  • SCM 500 | SAPKY50019 |
  • SCM 510 | SAPKY51015 |
  • SCM 700 | SAPKY70009 |
  • SCM 701 | SAPKY70103 |

Affected component

    SCM-APO-INT-EXT
    Interface to External Systems

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1494228

TAGS

#SQL-injection
#database
#FM-/SAPAPO/APX_GET_ANY_TABLE

More to explorer

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.