Due to improper input sanitization, an authenticated user with certain specific privileges can remotely call NZDT function modules listed in Solution Section to execute manipulated query or inject ABAP code to gain access to Backend Database. On successful exploitation the threat actor could completely compromise confidentiality, integrity, and availability of the system.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sap landscape transformation replication server 1.0 |
||
sap s\\/4hana 1511 |
||
sap s\\/4hana 1610 |
||
sap s\\/4hana 1709 |
||
sap s\\/4hana 1809 |
||
sap s\\/4hana 1909 |
||
sap s\\/4hana 2020 |
||
sap s\\/4hana 2021 |
||
sap landscape transformation 2.0 |
||
sap landscape transformation replication server 2.0 |
||
sap landscape transformation replication server 3.0 |
||
sap test data migration server 4.0 |