Skip links

Potential modification of persisted data in VIRSAHR, SAP security note 1597043

Description

A malicious user can exploit VIRSAHR and use specially crafted inputs to modify database commands, resulting in the modification of data persisted by the system.

Available fix and Supported packages

  • VIRSA | 400_46C | 400_46C
  • VIRSA | 400_620 | 400_620
  • VIRSA | 400_640 | 400_640
  • VIRSA | 400_700 | 400_700
  • VIRSAHR | 520_46C | 520_46C
  • VIRSAHR | 520_620 | 520_620
  • VIRSAHR | 520_640 | 520_640
  • VIRSAHR | 520_700 | 520_700
  • VIRSAHR | 530_46C | 530_46C
  • VIRSAHR | 530_620 | 530_620
  • VIRSAHR | 530_640 | 530_640
  • VIRSAHR | 530_700 | 530_700
  • VIRSA 400_46C | SAPK-V4C20INVIRSA |
  • VIRSA 400_620 | SAPK-V4719INVIRSA |
  • VIRSA 400_640 | SAPK-V4E20INVIRSA |
  • VIRSA 400_700 | SAPK-47013INVIRSA |
  • VIRSAHR 520_46C | SAPK-52013INVIRSAHR |
  • VIRSAHR 520_620 | SAPK-52114INVIRSAHR |
  • VIRSAHR 520_640 | SAPK-52214INVIRSAHR |
  • VIRSAHR 520_700 | SAPK-52314INVIRSAHR |
  • VIRSAHR 530_620 | SAPK-53116INVIRSAHR |
  • VIRSAHR 530_46C | SAPK-53016INVIRSAHR |
  • VIRSAHR 530_640 | SAPK-53216INVIRSAHR |
  • VIRSAHR 530_700 | SAPK-53316INVIRSAHR |

Affected component

    GRC-SAC
    SAP Access Control

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1597043

TAGS

#SQL-injection
#database
#VIRSAHR