Lucene search

K
cveSapCVE-2023-33987
HistoryJul 11, 2023 - 3:15 a.m.

CVE-2023-33987

2023-07-1103:15:09
CWE-444
sap
web.nvd.nist.gov
17
cve-2023-33987
sap
web dispatcher
security vulnerability
unauthenticated attack
network vulnerability

CVSS3

9.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

AI Score

8.8

Confidence

High

EPSS

0.002

Percentile

54.6%

An unauthenticated attacker in SAP Web Dispatcher - versions WEBDISP 7.49, WEBDISP 7.53, WEBDISP 7.54, WEBDISP 7.77, WEBDISP 7.81, WEBDISP 7.85, WEBDISP 7.88, WEBDISP 7.89, WEBDISP 7.90, KERNEL 7.49, KERNEL 7.53, KERNEL 7.54 KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.88, KERNEL 7.89, KERNEL 7.90, KRNL64NUC 7.49, KRNL64UC 7.49, KRNL64UC 7.53, HDB 2.00, XS_ADVANCED_RUNTIME 1.00, SAP_EXTENDED_APP_SERVICES 1, can submit a malicious crafted request over a network to a front-end server which may, over several attempts, result in a back-end server confusing the boundaries of malicious and legitimate messages. This can result in the back-end server executing a malicious payload which can be used to read or modify information on the server or make it temporarily unavailable.

Affected configurations

Nvd
Node
sapweb_dispatcherMatch7.49
OR
sapweb_dispatcherMatch7.53
OR
sapweb_dispatcherMatch7.54
OR
sapweb_dispatcherMatch7.77
OR
sapweb_dispatcherMatch7.81
OR
sapweb_dispatcherMatch7.85
OR
sapweb_dispatcherMatch7.88
OR
sapweb_dispatcherMatch7.89
OR
sapweb_dispatcherMatch7.90
OR
sapweb_dispatcherMatchhdb_2.00
OR
sapweb_dispatcherMatchkernel_7.49
OR
sapweb_dispatcherMatchkernel_7.53
OR
sapweb_dispatcherMatchkernel_7.54
OR
sapweb_dispatcherMatchkernel_7.77
OR
sapweb_dispatcherMatchkernel_7.81
OR
sapweb_dispatcherMatchkernel_7.85
OR
sapweb_dispatcherMatchkernel_7.88
OR
sapweb_dispatcherMatchkernel_7.89
OR
sapweb_dispatcherMatchkernel_7.90
OR
sapweb_dispatcherMatchkrnl64nuc_7.49
OR
sapweb_dispatcherMatchkrnl64uc_7.49
OR
sapweb_dispatcherMatchkrnl64uc_7.53
OR
sapweb_dispatcherMatchsap_extended_app_services_1
OR
sapweb_dispatcherMatchxs_advanced_runtime_1.00
VendorProductVersionCPE
sapweb_dispatcher7.49cpe:2.3:a:sap:web_dispatcher:7.49:*:*:*:*:*:*:*
sapweb_dispatcher7.53cpe:2.3:a:sap:web_dispatcher:7.53:*:*:*:*:*:*:*
sapweb_dispatcher7.54cpe:2.3:a:sap:web_dispatcher:7.54:*:*:*:*:*:*:*
sapweb_dispatcher7.77cpe:2.3:a:sap:web_dispatcher:7.77:*:*:*:*:*:*:*
sapweb_dispatcher7.81cpe:2.3:a:sap:web_dispatcher:7.81:*:*:*:*:*:*:*
sapweb_dispatcher7.85cpe:2.3:a:sap:web_dispatcher:7.85:*:*:*:*:*:*:*
sapweb_dispatcher7.88cpe:2.3:a:sap:web_dispatcher:7.88:*:*:*:*:*:*:*
sapweb_dispatcher7.89cpe:2.3:a:sap:web_dispatcher:7.89:*:*:*:*:*:*:*
sapweb_dispatcher7.90cpe:2.3:a:sap:web_dispatcher:7.90:*:*:*:*:*:*:*
sapweb_dispatcherhdb_2.00cpe:2.3:a:sap:web_dispatcher:hdb_2.00:*:*:*:*:*:*:*
Rows per page:
1-10 of 241

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SAP Web Dispatcher",
    "vendor": "SAP_SE",
    "versions": [
      {
        "status": "affected",
        "version": "WEBDISP 7.49"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.53"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.54"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.77"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.81"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.85"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.88"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.89"
      },
      {
        "status": "affected",
        "version": "WEBDISP 7.90"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.49"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.53"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.54 KERNEL 7.77"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.81"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.85"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.88"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.89"
      },
      {
        "status": "affected",
        "version": "KERNEL 7.90"
      },
      {
        "status": "affected",
        "version": "KRNL64NUC 7.49"
      },
      {
        "status": "affected",
        "version": "KRNL64UC 7.49"
      },
      {
        "status": "affected",
        "version": "KRNL64UC 7.53"
      },
      {
        "status": "affected",
        "version": "HDB 2.00"
      },
      {
        "status": "affected",
        "version": "XS_ADVANCED_RUNTIME 1.00"
      },
      {
        "status": "affected",
        "version": "SAP_EXTENDED_APP_SERVICES 1"
      }
    ]
  }
]

CVSS3

9.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

AI Score

8.8

Confidence

High

EPSS

0.002

Percentile

54.6%

Related for CVE-2023-33987