Описание
An attacker can exploit MDS COMPARE TOOL and use specially crafted inputs to read and modify database commands, resulting in the retrieval of additional information persisted by the system.
Ссылки
- Permissions Required
- Vendor Advisory
- Permissions Required
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:sap:master_data_synchronization:600:*:*:*:*:*:*:*
cpe:2.3:a:sap:master_data_synchronization:602:*:*:*:*:*:*:*
cpe:2.3:a:sap:master_data_synchronization:603:*:*:*:*:*:*:*
cpe:2.3:a:sap:master_data_synchronization:604:*:*:*:*:*:*:*
cpe:2.3:a:sap:master_data_synchronization:605:*:*:*:*:*:*:*
cpe:2.3:a:sap:master_data_synchronization:606:*:*:*:*:*:*:*
cpe:2.3:a:sap:master_data_synchronization:616:*:*:*:*:*:*:*
EPSS
Процентиль: 35%
0.00139
Низкий
4.2 Medium
CVSS3
6.1 Medium
CVSS3
Дефекты
CWE-89
Связанные уязвимости
CVSS3: 4.2
github
больше 2 лет назад
An attacker can exploit MDS COMPARE TOOL and use specially crafted inputs to read and modify database commands, resulting in the retrieval of additional information persisted by the system.
EPSS
Процентиль: 35%
0.00139
Низкий
4.2 Medium
CVSS3
6.1 Medium
CVSS3
Дефекты
CWE-89