CVE-2023-30744

In SAP AS NetWeaver JAVA - versions SERVERCORE 7.50, J2EE-FRMW 7.50, CORE-TOOLS 7.50, an unauthenticated attacker can attach to an open interface and make use of an open naming and directory API to instantiate an object which has methods which can be called without further authorization and authentication.  A subsequent call to one of these methods can read or change the state of existing services without any effect on availability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sap:netweaver_application_server_for_java:7.50:*:*:*:*:*:*:*

History

21 Nov 2024, 08:00

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 9.1
v2 : unknown
v3 : 8.2
References () https://launchpad.support.sap.com/#/notes/3317453 - Permissions Required () https://launchpad.support.sap.com/#/notes/3317453 - Permissions Required
References () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory

07 Nov 2023, 04:14

Type Values Removed Values Added
CWE CWE-862

Information

Published : 2023-05-09 02:15

Updated : 2024-11-21 08:00


NVD link : CVE-2023-30744

Mitre link : CVE-2023-30744

CVE.ORG link : CVE-2023-30744


JSON object : View

Products Affected

sap

  • netweaver_application_server_for_java
CWE
CWE-306

Missing Authentication for Critical Function