| |
Vulnerability CVE-2015-7828
Published: 2015-11-10
Description: |
SAP HANA Database 1.00 SPS10 and earlier do not require authentication, which allows remote attackers to execute arbitrary code or have unspecified other impact via a TrexNet packet to the (1) fcopydir, (2) fmkdir, (3) frmdir, (4) getenv, (5) dumpenv, (6) fcopy, (7) fput, (8) fdel, (9) fmove, (10) fget, (11) fappend, (12) fdir, (13) getTraces, (14) kill, (15) pexec, (16) stop, or (17) pythonexec method, aka SAP Security Note 2165583. |
See advisories in our WLB2 database: | Topic | Author | Date |
High |
| Onapsis | 10.11.2015 |
Type:
CWE-78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
)
CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Base Score |
Impact Subscore |
Exploitability Subscore |
10/10 |
10/10 |
10/10 |
Exploit range |
Attack complexity |
Authentication |
Remote |
Low |
No required |
Confidentiality impact |
Integrity impact |
Availability impact |
Complete |
Complete |
Complete |
References: |
https://www.onapsis.com/blog/analyzing-sap-security-notes-august-2015-edition
http://seclists.org/fulldisclosure/2015/Nov/36
http://packetstormsecurity.com/files/134281/SAP-HANA-TrexNet-Command-Execution.html
|
|
|
closedb();
?>
Copyright 2024, cxsecurity.com
|
|
|