Skip links

Information Disclosure in LaMa 3.0, SAP security note 2520772

Description

UPDATE 14th November 2017: This note has been re-released with updated CVSS Information and Priority.

Under certain conditions LaMa 3.0 allows an attacker with LaMa user or LaMa J2EE Database administrator rights to read passwords or confidential information of managed systems. The information disclosed is:

Hana MDC SYSTEM users passwords.

This may give an attacker the chance to connect to the Hana database and the Hana systemdb database.

The information is stored without encryption in the LaMa database. These passwords are visible by downloading the LaMa support information.

Note: Check Reasons and Prerequisites to see if the impact is relevant to your Lama Usage Scenario.

CVSS Information

CVSS v3 Base Score: 9.1 / 10
CVSS v3 Base Vector:

AV : Attack Vector (Related exploit range)

Network (N)

AC : Attack Complexity (Required attack complexity)

Low (L)

PR : Privileges Required (Level of privileges needed to exploit)

High (H)

UI : User Interaction (Required user participation)

None (N)

S : Scope (Change in scope due to impact caused to components beyond the vulnerable component)

Changed (C)

C : Impact to Confidentiality

High (H)

I : Impact to Integrity

High (H)

A : Impact to Availability

High (H)

SAP provides this CVSS v3 base score as an estimate of the risk posed by the issue reported in this note. This estimate does not take into account your own system configuration or operational environment. It is not intended to replace any risk assessments you are advised to conduct when deciding on the applicability or priority of this SAP security note. For more information, see the FAQ section at https://support.sap.com/securitynotes.

Available fix and Supported packages

  • VCM | 3.00 | 3.00
  • VCM LVM ENTERPRISE 3.0 | SP004 | 000001

Affected component

    BC-VCM-LVM
    Landscape Virtualization Management

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/2520772

TAGS

#Information-Exposure
#Information-Leak
#Elevation-of-Privileges