First published: Thu Oct 16 2014(Updated: )
Business Warehouse (BW) in SAP Netweaver AS ABAP 7.31 allows remote authenticated users to obtain sensitive information via a request to the RSDU_CCMS_GET_PROFILE_PARAM RFC function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver AS for ABAP | =7.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8312 has been classified as a medium severity vulnerability due to its potential to expose sensitive information for authenticated users.
To fix CVE-2014-8312, it's recommended to implement proper authorization checks for the RSDU_CCMS_GET_PROFILE_PARAM RFC function in SAP Netweaver ABAP 7.31.
CVE-2014-8312 affects users of SAP Netweaver AS ABAP version 7.31 who have remote authenticated access.
CVE-2014-8312 can expose sensitive configuration parameters and profiles to remote authenticated users.
Yes, SAP provides patches and updates that address the vulnerabilities, so it's crucial to keep your system updated.