Description
A malicious user can exploit AP-BP-BP and use specially crafted inputs to modify data-base commands, resulting in the retrieval of additional information persisted by the system.
Available fix and Supported packages
- SAP_APPL | 46B | 46B
- SAP_APPL | 46C | 46C
- SAP_APPL | 470 | 470
- SAP_APPL | 500 | 500
- SAP_APPL | 600 | 600
- SAP_APPL | 602 | 602
- SAP_APPL | 603 | 603
- SAP_APPL | 604 | 604
- SAP_APPL | 605 | 605
- SAP_APPL 46B | SAPKH46B62 |
- SAP_APPL 500 | SAPKH50024 |
- SAP_APPL 600 | SAPKH60019 |
- SAP_APPL 602 | SAPKH60209 |
- SAP_APPL 603 | SAPKH60308 |
- SAP_APPL 604 | SAPKH60409 |
- SAP_APPL 46C | SAPKH46C62 |
- SAP_APPL 605 | SAPKH60503 |
- SAP_APPL 470 | SAPKH47036 |
Affected component
- AP-BP-BP
BusinessByDesign: Business Partner
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1491101