Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential disclosure of persisted data in WEBCUIF, SAP security note 1470407

Description

A malicious user can exploit some of the Web UI Framework applications and features, and use specially crafted inputs to modify database commands, resulting in the retrieval of additional information persisted by the system. The following components are affected:

  • the SFLIGHT test application
  • the Business Role Customizing Tool application
  • the report CRM_GENIL_CUST_COPY2
  • classes CL_AXT_CHECK_TABLE_HANDLER, CL_CRM_UI_COMPONENT_PROFILE
  • Report CRM_THTMLB_UI_SEARCH

Available fix and Supported packages

  • CRMUIF | 520 | 520
  • CRMUIF | 600 | 600
  • WEBCUIF | 700 | 700
  • WEBCUIF | 701 | 701
  • WEBCUIF | 730 | 730
  • CRMUIF 520 | SAPK-52011INCRMUIF |
  • CRMUIF 600 | SAPK-60010INCRMUIF |
  • WEBCUIF 700 | SAPK-70007INWEBCUIF |
  • WEBCUIF 701 | SAPK-70102INWEBCUIF |
  • WEBCUIF 700 | SAPK-70008INWEBCUIF |
  • WEBCUIF 730 | 730 |

Affected component

    CA-WUI
    WebClient User Interface

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1470407

TAGS

#SQL-Injection
#WEBCUIF
#CRMUIF

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,