Lucene search

K
cve[email protected]CVE-2023-33992
HistoryJul 11, 2023 - 3:15 a.m.

CVE-2023-33992

2023-07-1103:15:09
CWE-862
web.nvd.nist.gov
16
sap
bw
bics
communication layer
sap_bw
sap_bw/4hana
data response
authorization
query
keyfigure
measure
security vulnerability
cve-2023-33992
nvd

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.4%

The SAP BW BICS communication layer in SAP Business Warehouse and SAP BW/4HANA - version SAP_BW 730, SAP_BW 731, SAP_BW 740, SAP_BW 730, SAP_BW 750, DW4CORE 100, DW4CORE 200, DW4CORE 300, may expose unauthorized cell values to the data response. To be able to exploit this, the user still needs authorizations on the query as well as on the keyfigure/measure level. The missing check only affects the data level.

Affected configurations

NVD
Node
sapbusiness_warehouseMatch730
OR
sapbusiness_warehouseMatch731
OR
sapbusiness_warehouseMatch740
OR
sapbusiness_warehouseMatch750
OR
sapbw\/4hanaMatch100
OR
sapbw\/4hanaMatch200
OR
sapbw\/4hanaMatch300

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SAP Business Warehouse and SAP BW/4HANA",
    "vendor": "SAP_SE",
    "versions": [
      {
        "status": "affected",
        "version": "SAP_BW 730"
      },
      {
        "status": "affected",
        "version": "SAP_BW 731"
      },
      {
        "status": "affected",
        "version": "SAP_BW 740"
      },
      {
        "status": "affected",
        "version": "SAP_BW 750"
      },
      {
        "status": "affected",
        "version": "DW4CORE 100"
      },
      {
        "status": "affected",
        "version": "DW4CORE 200"
      },
      {
        "status": "affected",
        "version": "DW4CORE 300"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

30.4%

Related for CVE-2023-33992