Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential disclosure of data in FM /SAPAPO/APX_GET_ANY_TABLE, SAP security note 1494228

Description

A malicious user can exploit FM /SAPAPO/APX_GET_ANY_TABLE and use specially crafted inputs to execute arbitrary database commands to retrieve, modify, or remove data persisted by the system.

Available fix and Supported packages

  • SAP_APO | 30A | 30A
  • SAP_APO | 310 | 310
  • SCM | 400 | 400
  • SCM | 410 | 410
  • SCM | 500 | 500
  • SCM | 510 | 510
  • SCM | 700 | 700
  • SCM | 701 | 701
  • SAP_APO 30A | SAPKY30A32 |
  • SAP_APO 310 | SAPKY31027 |
  • SCM 400 | SAPKY40022 |
  • SCM 410 | SAPKY41021 |
  • SCM 500 | SAPKY50019 |
  • SCM 510 | SAPKY51015 |
  • SCM 700 | SAPKY70009 |
  • SCM 701 | SAPKY70103 |

Affected component

    SCM-APO-INT-EXT
    Interface to External Systems

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1494228

TAGS

#SQL-injection
#database
#FM-/SAPAPO/APX_GET_ANY_TABLE

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,

Protect Your SAP with RedRays Security Platform

Explore the Power of Our Scanner with an Interactive Prototype Below