On the 14th of February 2023, SAP Security Patch Day saw the release of 21 new Security Notes.
There were 5 updates to previously released Patch Day Security Notes.
Notes by severity
HotNews | 1 |
Correction with high priority | 5 |
Correction with medium priority | 20 |
Correction with low priority | 0 |
Highlights
On February Patch Day SAP presents 6 high-severity Notes with 1 of them rated as HotNews and 5 of them rated as a correction with high priority.
21 is a comparatively large number of Security Notes for one Patch Day, however, we will cover the corrections with the highest priority as a digest for today.
Starting with 2622660 Security Note – Security updates for the browser control Google Chromium delivered with SAP Business Client – with a CVSS Score of 10. The update of the Note contains additional SAP Business Client Releases to the Solution section.
SAP Host Agent received a patch listed in Note 3285757 – Privilege Escalation vulnerability in SAP Host Agent (Start Service) – with a CVSS Score of 8.8 and rated as high priority correction. An attacker can send a specially crafted web service request with an operating system command that will be executed with administrator privileges by authenticating as a non-admin user and gaining local access to a server port designated for the SAP Host Agent Service. The OS command has the ability to disable the system and read, alter, or delete any user or system data.
The Note 3268172 released on December 2022 – Code Injection vulnerability in SAP BASIS – with a CVSS Score of 8.8, receives an update. The Note has been re-released with updated ‘Correction instruction’ and ‘Symptom’ information. Additionally, it was mentioned that this Note is still relevant even if you do not use a HANA DB on your system.
SAP BusinessObjects Business Intelligence Platform received two Security patches. The first to describe will be Note 3263135 – Information disclosure vulnerability in SAP BusinessObjects Business Intelligence platform – with a CVSS Score of 8.5. An authenticated attacker has access to sensitive information that is otherwise protected due to the Business Intelligence platform vulnerability. Successful exploitation could have a significant impact on confidentiality while having only a limited impact on the application’s integrity. The second Note is 3256787 – Unrestricted Upload of File in SAP BusinessObjects Business Intelligence Platform (CMC) – with a CVSS Score of 8.4. An authenticated admin user may upload malicious code to Business Intelligence Platform so that it may be executed by the application via the network.
The last Note to highlight will be the update of 3271091 Note – Privilege escalation vulnerability in SAP Business Planning and Consolidation – with a CVSS Score of 8.5. The changes made were generally minor, and none of them requires additional customer actions.
Summary
SAP Component | Number | Description | Priority | CVSS | CVSS Vector |
---|---|---|---|---|---|
BC-FES-BUS-DSK | 2622660 | Security updates for the browser control Google Chromium delivered with SAP Business Client | HotNews | 10.0 | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
BC-CCM-HAG | 3285757 | [CVE-2023-24523] Privilege Escalation vulnerability in SAP Host Agent (Start Service) | high | 8.8 | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
BC-DB-HDB-POR | 3268172 | [CVE-2022-41264] Code Injection vulnerability in SAP BASIS | high | 8.8 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
BI-BIP-INV | 3263135 | [CVE-2023-0020] Information disclosure vulnerability in SAP BusinessObjects Business Intelligence platform | high | 8.5 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L |
EPM-BPC-NW | 3271091 | [CVE-2022-41268] Privilege escalation vulnerability in SAP Business Planning and Consolidation | high | 8.5 | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
BI-BIP-CMC | 3256787 | [CVE-2023-24530] Unrestricted Upload of File in SAP BusinessObjects Business Intelligence Platform (CMC) | high | 8.4 | CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H |
SV-SMG-SVD-SWB | 3265846 | [CVE-2023-0024] Cross Site Scripting in SAP Solution Manager (BSP Application) | medium | 6.5 | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L |
SV-SMG-SVD-SWB | 3267442 | [CVE-2023-0025] Cross Site Scripting in SAP Solution Manager (BSP Application) | medium | 6.5 | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L |
SV-SMG-OP | 3270509 | [CVE-2023-23855] URL Redirection vulnerability in SAP Solution Manager | medium | 6.5 | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L |
GRC-SPC-AC | 3281724 | [CVE-2023-0019] Missing Authorization check in SAP GRC (Process Control) | medium | 6.5 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
FI-TV-ODT-MTR | 3290901 | [CVE-2023-24528] Missing Authorization Check in SAP Fiori apps for Travel Management in SAP ERP (My Travel Requests) | medium | 6.5 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
CA-GTF-CSC-DME | 2985905 | [CVE-2023-24524] Missing Authorization check in SAP S/4 HANA Map Treasury Correspondence Format Data | medium | 6.5 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
SV-SMG-MON-SYS | 3266751 | [CVE-2023-23852] Cross-Site Scripting (XSS) vulnerability in SAP Solution Manager 7.2 | medium | 6.1 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
BC-MID-AC | 3268959 | [Multiple CVEs] Multiple vulnerabilities in SAP NetWeaver AS for ABAP and ABAP Platform | medium | 6.1 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
BC-MID-ICF | 3271227 | [CVE-2023-23853] URL Redirection vulnerability in SAP NetWeaver Application Server for ABAP and ABAP Platform | medium | 6.1 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
CA-GTF-PCF | 3282663 | [CVE-2023-24529] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (Business Server Pages application) | medium | 6.1 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
BC-ABA-LA | 3293786 | [CVE-2023-23858] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform | medium | 6.1 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
BC-JAS-WEB | 3262544 | [CVE-2022-41262] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS for Java (Http Provider Service) | medium | 6.1 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
BC-BSP | 3274585 | [CVE-2023-25614] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework) | medium | 6.1 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
BC-BSP | 3269151 | [CVE-2023-24521] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework) | medium | 6.1 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
BC-BSP | 3269118 | [CVE-2023-24522] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework) | medium | 6.1 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
BC-ABA-LA | 3283283 | [CVE-2023-0013] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform | medium | 6.1 | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
EPM-BPC-NW-INF | 3275841 | [CVE-2023-23851] Unrestricted File Upload in SAP Business Planning and Consolidation | medium | 5.4 | CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
BI-RA-WBI-FE | 3263863 | [CVE-2023-23856] Cross-Site Scripting (XSS) vulnerability in Web Intelligence Interface | medium | 4.3 | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N |
CA-WUI-UI-TAG | 2788178 | [CVE-2023-24525] Cross-Site Scripting (XSS) vulnerability in SAP CRM WebClient UI | medium | 4.3 | CVSS:/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
BC-DWB-TOO-ABA | 3287291 | [CVE-2023-23854] Missing Authorization check in SAP NetWeaver AS ABAP and ABAP Platform | low | 3.8 | CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L |