Saturday, February 6, 2016

2153892 - Code injection vulnerability in SAP HANA Web-based Development Workbench

Symptom
SAP HANA Web-based Development Workbench contains code that permits attackers to use specially crafted inputs to modify database commands. This results in either the retrieval of additional information, or the modification of data persisted by the system.
CVSS Information
CVSS Base Score:  6.0 / 10
CVSS Base Vector:
AV : Access Vector (Related exploit range) Network (N)
AC : Access Complexity (Required attack complexity) Medium (M)
Au : Authentication (Level of authentication needed to exploit) Single (S)
C : Impact to Confidentiality Partial (P)
I  : Impact to Integrity Partial (P)
A : Impact to Availability Partial (P)
 SAP provides this CVSS base score as an estimate of the risk posed by the issue reported in this note. This estimate does not take into account your own system configuration or operational environment. It is not intended to replace any risk assessments you are advised to conduct when deciding on the applicability or priority of this SAP security note. For more information, see the FAQ section at https://support.sap.com/securitynotes.


Other Terms
Code injection, SAP HANA Web-based Development Workbench


Reason and Prerequisites
The attacker needs a valid user account with sap.hana.xs.ide.roles::Developer or sap.hana.xs.ide.roles::EditorDeveloper to perform the attack.


Solution
The issue has been fixed with HANA revision 93 (for SPS09) and revision 85.3 (for SPS08). Update at least to these revisions.



Header Data

Released On 21.05.2015 07:25:14
Release Status Released for Customer
Component HAN-WDE SAP HANA Web IDE
Priority Correction with high priority
Category Program error
Externally Reported
Yes

No comments:

Post a Comment