Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential disclosure of persisted data in the Q&Adb, SAP security note 1609900

Description

A malicious user can exploit the Question and Answer database (Q&Adb) and use specially crafted inputs to modify database commands, resulting in the retrieval of additional information persisted by the system.

Available fix and Supported packages

  • SAP_BASIS | 46A | 46D
  • SAP_BASIS | 610 | 640
  • SAP_BASIS | 700 | 702
  • SAP_BASIS | 710 | 730
  • SAP_BASIS | 731 | 731
  • SAP_BASIS | 800 | 802
  • SAP_BASIS 46B | SAPKB46B62 |
  • SAP_BASIS 46D | SAPKB46D45 |
  • SAP_BASIS 710 | SAPKB71013 |
  • SAP_BASIS 711 | SAPKB71108 |
  • SAP_BASIS 720 | SAPKB72006 |
  • SAP_BASIS 46C | SAPKB46C63 |
  • SAP_BASIS 620 | SAPKB62071 |
  • SAP_BASIS 640 | SAPKB64029 |
  • SAP_BASIS 731 | SAPKB73101 |
  • SAP_BASIS 700 | SAPKB70026 |
  • SAP_BASIS 701 | SAPKB70111 |
  • SAP_BASIS 702 | SAPKB70210 |

Affected component

    SV-ASA
    ASAP (AcceleratedSAP) Methodology

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1609900

TAGS

#SQL-injection
#database
#Q&amp-Adb

More to explorer