SAP Business Warehouse, versions - 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 782, and SAP BW4HANA, versions - 100, 200 allows an attacker authenticated with (high) developer privileges to submit a crafted request to generate and execute code without requiring any user interaction. It is possible to craft a request which will result in the execution of Operating System commands leading to Code Injection vulnerability which could completely compromise the confidentiality, integrity and availability of the server and any data or other applications running on it.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/2983367 | Permissions Required |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2020-12-09 17:15
Updated : 2024-02-28 18:08
NVD link : CVE-2020-26838
Mitre link : CVE-2020-26838
CVE.ORG link : CVE-2020-26838
JSON object : View
Products Affected
sap
- bw\/4hana
- business_warehouse
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')