Due to programming error in function module and report, IS-OIL component in SAP ECC and SAP S/4HANA allows an authenticated attacker to inject an arbitrary operating system command into an unprotected parameter in a common (default) extension. On successful exploitation, the attacker can read or modify the system data as well as shut down the system.
References
| Link | Resource |
|---|---|
| https://me.sap.com/notes/3350297 | Permissions Required |
| https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
| https://me.sap.com/notes/3350297 | Permissions Required |
| https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:10
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://me.sap.com/notes/3350297 - Permissions Required | |
| References | () https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
09 Dec 2023, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | Due to programming error in function module and report, IS-OIL component in SAP ECC and SAP S/4HANA allows an authenticated attacker to inject an arbitrary operating system command into an unprotected parameter in a common (default) extension. On successful exploitation, the attacker can read or modify the system data as well as shut down the system. |
18 Jul 2023, 18:28
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| CPE | cpe:2.3:a:sap:netweaver:805:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:605:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:604:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:617:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:600:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:807:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:603:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:618:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:802:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:803:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:800:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:804:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:806:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:602:*:*:*:*:*:*:* cpe:2.3:a:sap:netweaver:606:*:*:*:*:*:*:* |
|
| References | (MISC) https://me.sap.com/notes/3350297 - Permissions Required | |
| References | (MISC) https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - Vendor Advisory |
11 Jul 2023, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-07-11 03:15
Updated : 2024-11-21 08:10
NVD link : CVE-2023-36922
Mitre link : CVE-2023-36922
CVE.ORG link : CVE-2023-36922
JSON object : View
Products Affected
sap
- netweaver
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
