Audit Log Injection in SAP HANA Extended Application Services
CVE-2017-16680

7.5HIGH

Key Information:

Vendor
SAP
Vendor
CVE Published:
12 December 2017

Summary

The SAP HANA extended application services 1.0 is prone to audit log injection vulnerabilities due to inadequate user input validation in specific HTTP/REST endpoints of the controller service. This lack of validation could enable unprivileged attackers to forge audit log entries, potentially compromising the reliability of log information. Additionally, the system's handling of user account and authentication logs reveals a similar flaw, as log entries miss escaping in the log file, leading to potential misinterpretation of audit records. While the syslog entries remain unaffected, the presence of unescaped logs could disrupt security audits and compliance efforts.

Affected Version(s)

SAP HANA extended application services 1.0

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.