Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential modification or disclosure of persisted data in .., SAP security note 1515372

Description

This security note has been updated.
For more detailed information, see Security Note 1606213
A malicious user can exploit ABAP Test Framework Checks and use specially crafted inputs to modify data-base commands, resulting in either the retrieval of additional information or modification of data persisted by the system.

Available fix and Supported packages

  • SAP_BASIS | 620 | 640
  • SAP_BASIS | 700 | 702
  • SAP_BASIS | 710 | 730
  • SAP_BASIS | 72L | 800
  • SAP_BASIS 701 | SAPKB70108 |
  • SAP_BASIS 730 | SAPKB73001 |
  • SAP_BASIS 702 | SAPKB70206 |
  • SAP_BASIS 730 | SAPKB73002 |
  • SAP_BASIS 620 | SAPKB62070 |
  • SAP_BASIS 710 | SAPKB71012 |
  • SAP_BASIS 702 | SAPKB70207 |
  • SAP_BASIS 711 | SAPKB71107 |
  • SAP_BASIS 720 | SAPKB72005 |
  • SAP_BASIS 640 | SAPKB64028 |
  • SAP_BASIS 700 | SAPKB70024 |

Affected component

    BC-DWB-TOO-ATF
    ABAP Check Frameworks – ABAP Test Cockpit, Code Inspector

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1515372

TAGS

#SQL-injection
#database
#ABAP-Test-Framework-Checks

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,

Protect Your SAP with RedRays Security Platform

Explore the Power of Our Scanner with an Interactive Prototype Below