An attacker can exploit MDS COMPARE TOOL and use specially crafted inputs to read and modify database commands, resulting in the retrieval of additional information persisted by the system.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sap master data synchronization 600 |
||
sap master data synchronization 602 |
||
sap master data synchronization 603 |
||
sap master data synchronization 604 |
||
sap master data synchronization 605 |
||
sap master data synchronization 606 |
||
sap master data synchronization 616 |