Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

QPAP Potential modification or disclosure of persisted data, SAP security note 1591048

Description

A malicious user can exploit the function group QPAP for reading plans and use specially crafted inputs to modify database commands.  This results in either the retrieval of additional information, or the modification of data persisted by the system.

Available fix and Supported packages

  • SAP_APPL | 470 | 470
  • SAP_APPL | 500 | 500
  • SAP_APPL | 600 | 600
  • SAP_APPL | 602 | 602
  • SAP_APPL | 603 | 603
  • SAP_APPL | 604 | 604
  • SAP_APPL | 605 | 605
  • SAP_APPL 470 | SAPKH47036 |
  • SAP_APPL 500 | SAPKH50025 |
  • SAP_APPL 600 | SAPKH60020 |
  • SAP_APPL 602 | SAPKH60210 |
  • SAP_APPL 603 | SAPKH60309 |
  • SAP_APPL 604 | SAPKH60410 |
  • SAP_APPL 605 | SAPKH60505 |

Affected component

    QM-IM
    Quality Inspection

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1591048

TAGS

#SQL-injection
#database
#QPAP
#parameter-validity

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,

Protect Your SAP with RedRays Security Platform

Explore the Power of Our Scanner with an Interactive Prototype Below