Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

QPAP Potential modification or disclosure of persisted data, SAP security note 1591048

Description

A malicious user can exploit the function group QPAP for reading plans and use specially crafted inputs to modify database commands.  This results in either the retrieval of additional information, or the modification of data persisted by the system.

Available fix and Supported packages

  • SAP_APPL | 470 | 470
  • SAP_APPL | 500 | 500
  • SAP_APPL | 600 | 600
  • SAP_APPL | 602 | 602
  • SAP_APPL | 603 | 603
  • SAP_APPL | 604 | 604
  • SAP_APPL | 605 | 605
  • SAP_APPL 470 | SAPKH47036 |
  • SAP_APPL 500 | SAPKH50025 |
  • SAP_APPL 600 | SAPKH60020 |
  • SAP_APPL 602 | SAPKH60210 |
  • SAP_APPL 603 | SAPKH60309 |
  • SAP_APPL 604 | SAPKH60410 |
  • SAP_APPL 605 | SAPKH60505 |

Affected component

    QM-IM
    Quality Inspection

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1591048

TAGS

#SQL-injection
#database
#QPAP
#parameter-validity

More to explorer