Multiple SQL injection vulnerabilities in the Web-based Development Workbench in SAP HANA DB 1.00.091.00.1418659308 allow remote authenticated users to execute arbitrary SQL commands via the (1) remoteSourceName in the dropCredentials function or unspecified vectors in the (2) setTraceLevelsForXsApps, (3) _modifyUser, or (4) _newUser function, aka SAP Security Notes 2153898 and 2153765.
packetstormsecurity.com/files/133761/SAP-HANA-_modifyUser-SQL-Injection.html
packetstormsecurity.com/files/133762/SAP-HANA-_newUser-SQL-Injection.html
packetstormsecurity.com/files/133764/SAP-HANA-setTraceLevelsForXsApps-SQL-Injection.html
packetstormsecurity.com/files/133769/SAP-HANA-Drop-Credentials-SQL-Injection.html
seclists.org/fulldisclosure/2015/Sep/110
seclists.org/fulldisclosure/2015/Sep/111
seclists.org/fulldisclosure/2015/Sep/113
seclists.org/fulldisclosure/2015/Sep/118
www.onapsis.com/blog/analyzing-sap-security-notes-may-2015-edition
www.onapsis.com/research/security-advisories/sap-hana-drop-credentials-sql-injection
www.onapsis.com/research/security-advisories/sap-hana-sql-injection-modifyuser
www.onapsis.com/research/security-advisories/sap-hana-sql-injection-newuser
www.onapsis.com/research/security-advisories/sap-sql-injection-settracelevelsforxsapps