First published: Wed Feb 14 2018(Updated: )
Under certain circumstances, a specific endpoint of the Controller's API could be misused by unauthenticated users to execute SQL statements that deliver information about system configuration in SAP HANA Extended Application Services, 1.0.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP HANA Extended Application Services, Advanced Model | =1.0 | |
SAP HANA Extended Application Services, Advanced Model | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-2373 is classified as a medium severity vulnerability due to the potential exposure of sensitive system configuration information.
CVE-2018-2373 allows unauthenticated users to exploit a specific API endpoint, potentially executing SQL statements to extract system configuration data.
To fix CVE-2018-2373, it is recommended to apply the latest security patches provided by SAP for HANA Extended Application Services.
CVE-2018-2373 impacts users of SAP HANA Extended Application Services, version 1.0.
Environments running SAP HANA Extended Application Services version 1.0 without the necessary security updates are vulnerable to CVE-2018-2373.