Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Report RJ-JXINI generates unnecessary source code, SAP security note 1361038

Description

The report RJ-JXINI reads the field GSTRU from the Customizing table TMC4 and expects the name of a table in this field. This information is used to generate a second report that deletes all the contents of this table as an initialization.
If TMC4-GSTRU contains further SQL statements in addition to the table name, unexpected actions may be performed in the database as a result.

Available fix and Supported packages

  • IS-M | 3.04 | 3.04/7
  • IS-M | 4.01 | 4.01_02
  • IS-M | 4.02 | 402
  • IS-M | 461 | 461
  • IS-M | 462 | 462
  • IS-M | 463 | 463
  • IS-M | 464 | 464
  • IS-M | 471 | 471
  • IS-M | 472 | 472
  • IS-M | 600 | 600
  • IS-M | 602 | 602
  • IS-M | 603 | 603
  • IS-M | 604 | 604
  • IS-M 604 | SAPK-60404INISM |
  • IS-M 464 | SAPKIPPL31 |
  • IS-M 471 | SAPKIPPM24 |
  • IS-M 472 | SAPKIPPN18 |
  • IS-M 600 | SAPK-60017INISM |
  • IS-M 602 | SAPK-60207INISM |
  • IS-M 603 | SAPK-60306INISM |

Affected component

    IS-M
    Media

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1361038

TAGS

#RJ-JXINI
#RJ-JXIN1

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,