Vulnerability Details : CVE-2015-3994
The grant.xsfunc application in testApps/grantAccess/ in the XS Engine in SAP HANA DB 1.00.73.00.389160 (NewDB100_REL) allows remote authenticated users to spoof log entries via a crafted request, aka SAP Security Note 2109818.
Vulnerability category: Input validation
Products affected by CVE-2015-3994
- cpe:2.3:a:sap:hana:1.00.73.00.389160:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-3994
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 57 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3994
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:P/A:N |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2015-3994
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3994
-
http://www.securityfocus.com/archive/1/535618/100/0/threaded
SecurityFocus
-
http://seclists.org/fulldisclosure/2015/May/118
Full Disclosure: [Onapsis Security Advisory 2015-007] SAP HANA Log Injection Vulnerability
-
http://www.onapsis.com/research/security-advisories/SAP-HANA-Log-Injection-Vulnerability-in-Extended-Application-Services
SAP HANA Log Injection Vulnerability in Extended Application Services | Onapsis
-
http://www.securityfocus.com/bid/74859
SAP HANA DB CVE-2015-3994 Security Bypass Vulnerability
-
http://packetstormsecurity.com/files/132067/SAP-HANA-Log-Injection.html
SAP HANA Log Injection ≈ Packet Storm
Jump to