Description
A malicious user can exploit VIRSAHR and use specially crafted inputs to modify database commands, resulting in the modification of data persisted by the system.
Available fix and Supported packages
- VIRSA | 400_46C | 400_46C
- VIRSA | 400_620 | 400_620
- VIRSA | 400_640 | 400_640
- VIRSA | 400_700 | 400_700
- VIRSAHR | 520_46C | 520_46C
- VIRSAHR | 520_620 | 520_620
- VIRSAHR | 520_640 | 520_640
- VIRSAHR | 520_700 | 520_700
- VIRSAHR | 530_46C | 530_46C
- VIRSAHR | 530_620 | 530_620
- VIRSAHR | 530_640 | 530_640
- VIRSAHR | 530_700 | 530_700
- VIRSA 400_46C | SAPK-V4C20INVIRSA |
- VIRSA 400_620 | SAPK-V4719INVIRSA |
- VIRSA 400_640 | SAPK-V4E20INVIRSA |
- VIRSA 400_700 | SAPK-47013INVIRSA |
- VIRSAHR 520_46C | SAPK-52013INVIRSAHR |
- VIRSAHR 520_620 | SAPK-52114INVIRSAHR |
- VIRSAHR 520_640 | SAPK-52214INVIRSAHR |
- VIRSAHR 520_700 | SAPK-52314INVIRSAHR |
- VIRSAHR 530_620 | SAPK-53116INVIRSAHR |
- VIRSAHR 530_46C | SAPK-53016INVIRSAHR |
- VIRSAHR 530_640 | SAPK-53216INVIRSAHR |
- VIRSAHR 530_700 | SAPK-53316INVIRSAHR |
Affected component
- GRC-SAC
SAP Access Control
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1597043