The default installation of SAP R/3, when using Oracle and SQL*net V2 3.x, 4.x, and 6.10, allows remote attackers to obtain arbitrary, sensitive SAP data by directly connecting to the Oracle database and executing queries against the database, which is not password-protected.
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2002-04/0387.html | Exploit Patch Vendor Advisory |
http://www.securityfocus.com/bid/4613 | Exploit Patch Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/8972 |
Configurations
Information
Published : 2004-04-14 21:00
Updated : 2017-07-10 18:29
NVD link : CVE-2002-1578
Mitre link : CVE-2002-1578
JSON object : View
CWE
Products Affected
sap
- sap_r_3