The default installation of SAP R/3, when using Oracle and SQL*net V2 3.x, 4.x, and 6.10, allows remote attackers to obtain arbitrary, sensitive SAP data by directly connecting to the Oracle database and executing queries against the database, which is not password-protected.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2002-04/0387.html | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/4613 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/8972 | |
http://archives.neohapsis.com/archives/bugtraq/2002-04/0387.html | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/4613 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/8972 |
Configurations
History
20 Nov 2024, 23:41
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2002-04/0387.html - Exploit, Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/4613 - Exploit, Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/8972 - |
Information
Published : 2004-04-15 04:00
Updated : 2024-11-20 23:41
NVD link : CVE-2002-1578
Mitre link : CVE-2002-1578
CVE.ORG link : CVE-2002-1578
JSON object : View
Products Affected
sap
- sap_r_3
CWE