CVE-2023-27893

An attacker authenticated as a user with a non-administrative role and a common remote execution authorization in SAP Solution Manager and ABAP managed systems (ST-PI) - versions 2088_1_700, 2008_1_710, 740, can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform.  Depending on the function executed, the attack can read or modify any user or application data and can make the application unavailable.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sap:solution_manager:740:*:*:*:*:*:*:*

History

21 Nov 2024, 07:53

Type Values Removed Values Added
References () https://launchpad.support.sap.com/#/notes/3296476 - Permissions Required () https://launchpad.support.sap.com/#/notes/3296476 - Permissions Required
References () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory

Information

Published : 2023-03-14 06:15

Updated : 2024-11-21 07:53


NVD link : CVE-2023-27893

Mitre link : CVE-2023-27893

CVE.ORG link : CVE-2023-27893


JSON object : View

Products Affected

sap

  • solution_manager
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')