CVE-2023-30744

In SAP AS NetWeaver JAVA - versions SERVERCORE 7.50, J2EE-FRMW 7.50, CORE-TOOLS 7.50, an unauthenticated attacker can attach to an open interface and make use of an open naming and directory API to instantiate an object which has methods which can be called without further authorization and authentication.  A subsequent call to one of these methods can read or change the state of existing services without any effect on availability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:sap:netweaver_application_server_for_java:7.50:*:*:*:*:*:*:*

History

15 May 2023, 17:33

Type Values Removed Values Added
CPE cpe:2.3:a:sap:netweaver_application_server_for_java:7.50:*:*:*:*:*:*:*
References (MISC) https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - (MISC) https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory
References (MISC) https://launchpad.support.sap.com/#/notes/3317453 - (MISC) https://launchpad.support.sap.com/#/notes/3317453 - Permissions Required
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.1

09 May 2023, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-09 02:15

Updated : 2024-02-04 23:37


NVD link : CVE-2023-30744

Mitre link : CVE-2023-30744

CVE.ORG link : CVE-2023-30744


JSON object : View

Products Affected

sap

  • netweaver_application_server_for_java
CWE
CWE-306

Missing Authentication for Critical Function