First published: Thu Oct 15 2015(Updated: )
Multiple SQL injection vulnerabilities in the Web-based Development Workbench in SAP HANA DB 1.00.091.00.1418659308 allow remote authenticated users to execute arbitrary SQL commands via the (1) remoteSourceName in the dropCredentials function or unspecified vectors in the (2) setTraceLevelsForXsApps, (3) _modifyUser, or (4) _newUser function, aka SAP Security Notes 2153898 and 2153765.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP HANA Database | =1.00.091.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7725 is classified as a high severity SQL injection vulnerability.
To fix CVE-2015-7725, update your SAP HANA DB to the latest version that patches this vulnerability.
CVE-2015-7725 affects remote authenticated users of SAP HANA DB version 1.00.091.00.
The consequences of CVE-2015-7725 can include unauthorized execution of arbitrary SQL commands.
CVE-2015-7725 can be exploited relatively easily by authenticated users due to improper input validation.