Lucene search

K
cve[email protected]CVE-2023-24521
HistoryFeb 14, 2023 - 4:15 a.m.

CVE-2023-24521

2023-02-1404:15:12
CWE-79
web.nvd.nist.gov
28
sap
netweaver
abap
bsp
framework
input sanitization
cve-2023-24521
unauthenticated user
session alteration
confidentiality
integrity
data access
network injection

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.4%

Due to insufficient input sanitization, SAP NetWeaver AS ABAP (BSP Framework) - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, allows an unauthenticated user to alter the current session of the user by injecting the malicious code over the network and gain access to the unintended data. This may lead to a limited impact on the confidentiality and the integrity of the application.

Affected configurations

NVD
Node
sapnetweaver_as_abap_business_server_pagesMatch700
OR
sapnetweaver_as_abap_business_server_pagesMatch701
OR
sapnetweaver_as_abap_business_server_pagesMatch702
OR
sapnetweaver_as_abap_business_server_pagesMatch731
OR
sapnetweaver_as_abap_business_server_pagesMatch740
OR
sapnetweaver_as_abap_business_server_pagesMatch750
OR
sapnetweaver_as_abap_business_server_pagesMatch751
OR
sapnetweaver_as_abap_business_server_pagesMatch752
OR
sapnetweaver_as_abap_business_server_pagesMatch753
OR
sapnetweaver_as_abap_business_server_pagesMatch754
OR
sapnetweaver_as_abap_business_server_pagesMatch755
OR
sapnetweaver_as_abap_business_server_pagesMatch756
OR
sapnetweaver_as_abap_business_server_pagesMatch757

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "NetWeaver AS ABAP (BSP Framework)",
    "vendor": "SAP",
    "versions": [
      {
        "status": "affected",
        "version": "700"
      },
      {
        "status": "affected",
        "version": "701"
      },
      {
        "status": "affected",
        "version": "702"
      },
      {
        "status": "affected",
        "version": "731"
      },
      {
        "status": "affected",
        "version": "740"
      },
      {
        "status": "affected",
        "version": "750"
      },
      {
        "status": "affected",
        "version": "751"
      },
      {
        "status": "affected",
        "version": "752"
      },
      {
        "status": "affected",
        "version": "753"
      },
      {
        "status": "affected",
        "version": "754"
      },
      {
        "status": "affected",
        "version": "755"
      },
      {
        "status": "affected",
        "version": "756"
      },
      {
        "status": "affected",
        "version": "757"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.4%

Related for CVE-2023-24521