Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Potential modif./disclosure of persisted data in EWM CHM, SAP security note 1756211

Description

An attacker can exploit EWM Check Monitor and use specially crafted inputs to modify database commands. This results in either the retrieval of additional information, or the modification of data persisted by the system.

Available fix and Supported packages

  • SCMEWM | 510 | 510
  • SCMEWM | 700 | 700
  • SCMEWM | 701 | 701
  • SCMEWM | 702 | 702
  • SCMEWM | 712 | 712
  • SCMEWM 712 | 712 |
  • SCMEWM 702 | SAPK-70205INSCMEWM |
  • SCMEWM 510 | SAPK-51019INSCMEWM |
  • SCMEWM 700 | SAPK-70013INSCMEWM |
  • SCMEWM 701 | SAPK-70110INSCMEWM |

Affected component

    SCM-EWM-MON
    Monitoring

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1756211

TAGS

#SQL-injection
#database
#SCMEWM
#EWM
#CHM

More to explorer

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.