First published: Tue Sep 14 2021(Updated: )
Due to improper input sanitization, an authenticated user with certain specific privileges can remotely call NZDT function modules listed in Solution Section to execute manipulated query or inject ABAP code to gain access to Backend Database. On successful exploitation the threat actor could completely compromise confidentiality, integrity, and availability of the system.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sap Landscape Transformation | =2.0 | |
Sap Landscape Transformation Replication Server | =1.0 | |
Sap Landscape Transformation Replication Server | =2.0 | |
Sap Landscape Transformation Replication Server | =3.0 | |
Sap S\/4hana | =1511 | |
Sap S\/4hana | =1610 | |
Sap S\/4hana | =1709 | |
Sap S\/4hana | =1809 | |
Sap S\/4hana | =1909 | |
Sap S\/4hana | =2020 | |
Sap S\/4hana | =2021 | |
Sap Test Data Migration Server | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.