Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential disclosure of persisted data in WEBCUIF, SAP security note 1470407

Description

A malicious user can exploit some of the Web UI Framework applications and features, and use specially crafted inputs to modify database commands, resulting in the retrieval of additional information persisted by the system. The following components are affected:

  • the SFLIGHT test application
  • the Business Role Customizing Tool application
  • the report CRM_GENIL_CUST_COPY2
  • classes CL_AXT_CHECK_TABLE_HANDLER, CL_CRM_UI_COMPONENT_PROFILE
  • Report CRM_THTMLB_UI_SEARCH

Available fix and Supported packages

  • CRMUIF | 520 | 520
  • CRMUIF | 600 | 600
  • WEBCUIF | 700 | 700
  • WEBCUIF | 701 | 701
  • WEBCUIF | 730 | 730
  • CRMUIF 520 | SAPK-52011INCRMUIF |
  • CRMUIF 600 | SAPK-60010INCRMUIF |
  • WEBCUIF 700 | SAPK-70007INWEBCUIF |
  • WEBCUIF 701 | SAPK-70102INWEBCUIF |
  • WEBCUIF 700 | SAPK-70008INWEBCUIF |
  • WEBCUIF 730 | 730 |

Affected component

    CA-WUI
    WebClient User Interface

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1470407

TAGS

#SQL-Injection
#WEBCUIF
#CRMUIF

More to explorer