Under certain circumstances, a specific endpoint of the Controller's API could be misused by unauthenticated users to execute SQL statements that deliver information about system configuration in SAP HANA Extended Application Services, 1.0.
References
| Link | Resource |
|---|---|
| https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | Vendor Advisory |
| https://launchpad.support.sap.com/#/notes/2589129 | Permissions Required |
| https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ | Vendor Advisory |
| https://launchpad.support.sap.com/#/notes/2589129 | Permissions Required |
Configurations
History
21 Nov 2024, 04:03
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ - Vendor Advisory | |
| References | () https://launchpad.support.sap.com/#/notes/2589129 - Permissions Required |
21 Dec 2023, 04:21
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:sap:hana_extended_application_services:1.0:*:*:*:*:*:*:* |
Information
Published : 2018-02-14 12:29
Updated : 2024-11-21 04:03
NVD link : CVE-2018-2373
Mitre link : CVE-2018-2373
CVE.ORG link : CVE-2018-2373
JSON object : View
Products Affected
sap
- hana_extended_application_services
CWE
