Description
A malicious user can exploit the function group QPAP for reading plans and use specially crafted inputs to modify database commands. This results in either the retrieval of additional information, or the modification of data persisted by the system.
Available fix and Supported packages
- SAP_APPL | 470 | 470
- SAP_APPL | 500 | 500
- SAP_APPL | 600 | 600
- SAP_APPL | 602 | 602
- SAP_APPL | 603 | 603
- SAP_APPL | 604 | 604
- SAP_APPL | 605 | 605
- SAP_APPL 470 | SAPKH47036 |
- SAP_APPL 500 | SAPKH50025 |
- SAP_APPL 600 | SAPKH60020 |
- SAP_APPL 602 | SAPKH60210 |
- SAP_APPL 603 | SAPKH60309 |
- SAP_APPL 604 | SAPKH60410 |
- SAP_APPL 605 | SAPKH60505 |
Affected component
- QM-IM
Quality Inspection
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/1591048