Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential information disclosure relating to passwords, SAP security note 1501328

Description

A malicious user can discover information relating to passwords in WebDynpro for Java. This information could be used to allow the malicious user to specialise their attacks against passwords.

Available fix and Supported packages

  • SAP-JEE | 6.40 | 6.40
  • SAP_JTECHS | 7.00 | 7.02
  • SAP_JTECHF | 7.00 | 7.02
  • SAP J2EE ENGINE 6.40 | SP024 | 000004
  • SAP J2EE ENGINE 6.40 | SP025 | 000005
  • SAP J2EE ENGINE 6.40 | SP026 | 000002
  • SAP J2EE ENGINE 6.40 | SP027 | 000000
  • SAP JAVA TECH SERVICES 7.00 | SP018 | 000020
  • SAP JAVA TECH SERVICES 7.00 | SP019 | 000021
  • SAP JAVA TECH SERVICES 7.00 | SP020 | 000018
  • SAP JAVA TECH SERVICES 7.00 | SP021 | 000014
  • SAP JAVA TECH SERVICES 7.00 | SP022 | 000006
  • SAP JAVA TECH SERVICES 7.00 | SP023 | 000000
  • SAP JAVA TECH SERVICES 7.01 | SP003 | 000018
  • SAP JAVA TECH SERVICES 7.01 | SP004 | 000025
  • SAP JAVA TECH SERVICES 7.01 | SP005 | 000019
  • SAP JAVA TECH SERVICES 7.01 | SP006 | 000015
  • SAP JAVA TECH SERVICES 7.01 | SP007 | 000004
  • SAP JAVA TECH SERVICES 7.01 | SP008 | 000000
  • SAP JAVA TECH SERVICES 7.02 | SP003 | 000008
  • SAP JAVA TECH SERVICES 7.02 | SP004 | 000005
  • SAP JAVA TECH SERVICES 7.02 | SP005 | 000001
  • SAP JAVA TECH SERVICES 7.02 | SP006 | 000000

Affected component

    BC-WD-JAV
    WebDynpro Java

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1501328

TAGS

#Information-disclosure
#WebDynpro-for-Java.

More to explorer