An attacker authenticated as a user with a non-administrative role and a common remote execution authorization in SAP Solution Manager and ABAP managed systems (ST-PI) - versions 2088_1_700, 2008_1_710, 740, can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform. Depending on the function executed, the attack can read or modify any user or application data and can make the application unavailable.
References
Link | Resource |
---|---|
https://launchpad.support.sap.com/#/notes/3296476 | Permissions Required |
https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Configurations
History
29 Mar 2023, 07:32
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory | |
References | (MISC) https://launchpad.support.sap.com/#/notes/3296476 - Permissions Required | |
CPE | cpe:2.3:a:sap:solution_manager:740:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
14 Mar 2023, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-14 06:15
Updated : 2024-02-04 23:14
NVD link : CVE-2023-27893
Mitre link : CVE-2023-27893
CVE.ORG link : CVE-2023-27893
JSON object : View
Products Affected
sap
- solution_manager
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')