CVE-2019-0266
https://notcve.org/view.php?id=CVE-2019-0266
Under certain conditions SAP HANA Extended Application Services, version 1.0, advanced model (XS advanced) writes credentials of platform users to a trace file of the SAP HANA system. Even though this trace file is protected from unauthorized access, the risk of leaking information is increased. En determinadas condiciones, SAP HANA Extended Application Services, en su versión 1.0 de modelo avanzado (XS advanced) escribe las credenciales de los usuarios de la plataforma en un archivo de rastreo del sistema SAP HANA. Aunque este archivo está protegido contra accesos no autorizados, el riesgo de fuga de información aumenta. • http://www.securityfocus.com/bid/106988 https://launchpad.support.sap.com/#/notes/2724713 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=510922943 • CWE-532: Insertion of Sensitive Information into Log File •
CVE-2018-2502
https://notcve.org/view.php?id=CVE-2018-2502
TRACE method is enabled in SAP Business One Service Layer . Attacker can use XST (Cross Site Tracing) attack if frontend applications that are using Service Layer has a XSS vulnerability. This has been fixed in SAP Business One Service Layer (B1_ON_HANA, versions 9.2, 9.3). El método TRACE está habilitado en SAP Business One Service Layer. Un atacante puede emplear un ataque XST (Cross-Site Tracing) si las aplicaciones del frontend que emplean Service Layer tienen una vulnerabilidad Cross-Site Scripting (XSS). • http://www.securityfocus.com/bid/106173 https://launchpad.support.sap.com/#/notes/2680492 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2018-2497
https://notcve.org/view.php?id=CVE-2018-2497
The security audit log of SAP HANA, versions 1.0 and 2.0, does not log SELECT events if these events are part of a statement with the syntax CREATE TABLE <table_name> AS SELECT. El registro de auditoría de seguridad interna en SAP HANA 1.0 y 2.0 no registra los eventos SELECT si forman parte de una instrucción con la sintaxis CREATE TABLE AS SELECT. • http://www.securityfocus.com/bid/106152 https://launchpad.support.sap.com/#/notes/2704878 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=508559699 •
CVE-2018-2465
https://notcve.org/view.php?id=CVE-2018-2465
SAP HANA (versions 1.0 and 2.0) Extended Application Services classic model OData parser does not sufficiently validate XML. By exploiting, an unauthorized hacker can cause the database server to crash. El analizador OData modelo clásico de SAP HANA (versiones 1.0 y 2.0) Extended Application Services no valida suficientemente los XML. Mediante su explotación, un hacker no autorizado podría provocar el cierre inesperado del servidor de la base de datos. • http://www.securityfocus.com/bid/105324 https://launchpad.support.sap.com/#/notes/2681207 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499356993 • CWE-20: Improper Input Validation •
CVE-2018-2451
https://notcve.org/view.php?id=CVE-2018-2451
XS Command-Line Interface (CLI) user sessions with the SAP HANA Extended Application Services (XS), version 1, advanced server may have an unintentional prolonged period of validity. Consequently, a platform user could access controller resources via active CLI session even after corresponding authorizations have been revoked meanwhile by an administrator user. Similarly, an attacker who managed to gain access to the platform user's session might misuse the session token even after the session has been closed. En las sesiones de usuario XS Command-Line Interface (CLI) con SAP HANA Extended Application Services (XS), versión 1, el servidor avanzado podría tener un período de validez prolongado no intencionado. En consecuencia, un usuario de la plataforma podría acceder a recursos del controlador mediante una sesión de la interfaz de línea de comandos activa incluso después de que las autorizaciones correspondientes hayan sido revocadas por un usuario administrador. • http://www.securityfocus.com/bid/105091 https://launchpad.support.sap.com/#/notes/2590705 https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=499352742 • CWE-613: Insufficient Session Expiration •