A malicious user could theoretically exploit SCM Resource Master Data and use specially crafted inputs to modify database commands, resulting in the retrieval of additional information persisted by the system.
Available fix and Supported packages
- SCM_BASIS | 510 | 510
- SCM_BASIS | 700 | 700
- SCM_BASIS | 701 | 701
- SCM_BASIS 701 | SAPK-70102INSCMBASIS |
- SCM_BASIS 510 | SAPK-51018INSCMBASIS |
- SCM_BASIS 700 | SAPK-70009INSCMBASIS |
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.