Description
A malicious user can exploit some of the Web UI Framework applications and features, and use specially crafted inputs to modify database commands, resulting in the retrieval of additional information persisted by the system. The following components are affected:
- the SFLIGHT test application
- the Business Role Customizing Tool application
- the report CRM_GENIL_CUST_COPY2
- classes CL_AXT_CHECK_TABLE_HANDLER, CL_CRM_UI_COMPONENT_PROFILE
- Report CRM_THTMLB_UI_SEARCH
Available fix and Supported packages
- CRMUIF | 520 | 520
- CRMUIF | 600 | 600
- WEBCUIF | 700 | 700
- WEBCUIF | 701 | 701
- WEBCUIF | 730 | 730
- CRMUIF 520 | SAPK-52011INCRMUIF |
- CRMUIF 600 | SAPK-60010INCRMUIF |
- WEBCUIF 700 | SAPK-70007INWEBCUIF |
- WEBCUIF 701 | SAPK-70102INWEBCUIF |
- WEBCUIF 700 | SAPK-70008INWEBCUIF |
- WEBCUIF 730 | 730 |
Affected component
- CA-WUI
WebClient User Interface
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1470407