Under certain circumstances, a specific endpoint of the Controller's API could be misused by unauthenticated users to execute SQL statements that deliver information about system configuration in SAP HANA Extended Application Services, 1.0.
References
Link | Resource |
---|---|
https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2589129 | Permissions Required |
https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/2589129 | Permissions Required |
Configurations
History
21 Nov 2024, 04:03
Type | Values Removed | Values Added |
---|---|---|
References | () https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ - Vendor Advisory | |
References | () https://launchpad.support.sap.com/#/notes/2589129 - Permissions Required |
21 Dec 2023, 04:21
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:sap:hana_extended_application_services:1.0:*:*:*:*:*:*:* | |
First Time |
Sap hana Extended Application Services
|
Information
Published : 2018-02-14 12:29
Updated : 2024-11-21 04:03
NVD link : CVE-2018-2373
Mitre link : CVE-2018-2373
CVE.ORG link : CVE-2018-2373
JSON object : View
Products Affected
sap
- hana_extended_application_services
CWE