Downloading "SAP HANA Arbitrary Audit Injection via SQL Protocol"

By exploiting this SAP HANA vulnerability, an attacker could tamper the audit logs, hiding his evidence of an attack to a HANA system.

Please fill in the following form in order to download the selected Onapsis' resource. The system will send you a download link to your email.

By registering, you will obtain the following benefits:

  • Receive information regarding new/upcoming Onapsis Security Advisories before public release.
  • Receive new issue of Onapsis' SAP Security In-Depth publication before everyone else.
  • Free subscription to the Onapsis Security Newsletter.
Onapsis respects your privacy, please view our updated privacy policy.