First published: Thu Oct 15 2015(Updated: )
Multiple SQL injection vulnerabilities in the Web-based Development Workbench in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allow remote authenticated users to execute arbitrary SQL commands via unspecified vectors in the (1) trace configuration page or (2) getSqlTraceConfiguration function, aka SAP Security Note 2153898.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP HANA Database | =1.00.73.00.389160 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7727 is classified with a medium severity due to its potential to allow authenticated users to execute arbitrary SQL commands.
To fix CVE-2015-7727, it is recommended to apply the latest security patches provided by SAP for HANA version 1.00.73.00.389160.
CVE-2015-7727 affects SAP HANA version 1.00.73.00.389160.
CVE-2015-7727 includes multiple SQL injection vulnerabilities that can be exploited via the trace configuration page and the getSqlTraceConfiguration function.
The vulnerabilities in CVE-2015-7727 can be exploited by remote authenticated users with access to the affected SAP HANA system.