Description
This security note has been updated.
For more detailed information, see Security Note 1606213
A malicious user can exploit ABAP Test Framework Checks and use specially crafted inputs to modify data-base commands, resulting in either the retrieval of additional information or modification of data persisted by the system.
Available fix and Supported packages
- SAP_BASIS | 620 | 640
- SAP_BASIS | 700 | 702
- SAP_BASIS | 710 | 730
- SAP_BASIS | 72L | 800
- SAP_BASIS 701 | SAPKB70108 |
- SAP_BASIS 730 | SAPKB73001 |
- SAP_BASIS 702 | SAPKB70206 |
- SAP_BASIS 730 | SAPKB73002 |
- SAP_BASIS 620 | SAPKB62070 |
- SAP_BASIS 710 | SAPKB71012 |
- SAP_BASIS 702 | SAPKB70207 |
- SAP_BASIS 711 | SAPKB71107 |
- SAP_BASIS 720 | SAPKB72005 |
- SAP_BASIS 640 | SAPKB64028 |
- SAP_BASIS 700 | SAPKB70024 |
Affected component
- BC-DWB-TOO-ATF
ABAP Check Frameworks – ABAP Test Cockpit, Code Inspector
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1515372