An attacker authenticated as a user with a non-administrative role and a common remote execution authorization in SAP Solution Manager and ABAP managed systems (ST-PI) - versions 2088_1_700, 2008_1_710, 740, can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform. Depending on the function executed, the attack can read or modify any user or application data and can make the application unavailable.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3296476 | Permissions Required |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
https://launchpad.support.sap.com/#/notes/3296476 | Permissions Required |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 07:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://launchpad.support.sap.com/#/notes/3296476 - Permissions Required | |
References | () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory |
Information
Published : 2023-03-14 06:15
Updated : 2024-11-21 07:53
NVD link : CVE-2023-27893
Mitre link : CVE-2023-27893
CVE.ORG link : CVE-2023-27893
JSON object : View
Products Affected
sap
- solution_manager
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')