Lucene search

K
cve[email protected]CVE-2023-27269
HistoryMar 14, 2023 - 5:15 a.m.

CVE-2023-27269

2023-03-1405:15:30
CWE-22
web.nvd.nist.gov
41
cve-2023-27269
sap
netweaver
abap
application server
directory traversal
security flaw

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H

9.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.5%

SAP NetWeaver Application Server for ABAP and ABAP Platform - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791, allows an attacker with non-administrative authorizations to exploit a directory traversal flaw in an available service to overwrite the system files. Β In this attack, no data can be read but potentially critical OS files can be overwritten making the system unavailable.

Affected configurations

NVD
Node
sapnetweaver_application_server_abapMatch700
OR
sapnetweaver_application_server_abapMatch701
OR
sapnetweaver_application_server_abapMatch702
OR
sapnetweaver_application_server_abapMatch731
OR
sapnetweaver_application_server_abapMatch740
OR
sapnetweaver_application_server_abapMatch750
OR
sapnetweaver_application_server_abapMatch751
OR
sapnetweaver_application_server_abapMatch752
OR
sapnetweaver_application_server_abapMatch753
OR
sapnetweaver_application_server_abapMatch754
OR
sapnetweaver_application_server_abapMatch755
OR
sapnetweaver_application_server_abapMatch756
OR
sapnetweaver_application_server_abapMatch757
OR
sapnetweaver_application_server_abapMatch791

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "NetWeaver Application Server for ABAP and ABAP Platform",
    "vendor": "SAP",
    "versions": [
      {
        "status": "affected",
        "version": "700"
      },
      {
        "status": "affected",
        "version": "701"
      },
      {
        "status": "affected",
        "version": "702"
      },
      {
        "status": "affected",
        "version": "731"
      },
      {
        "status": "affected",
        "version": "740"
      },
      {
        "status": "affected",
        "version": "750"
      },
      {
        "status": "affected",
        "version": "751"
      },
      {
        "status": "affected",
        "version": "752"
      },
      {
        "status": "affected",
        "version": "753"
      },
      {
        "status": "affected",
        "version": "754"
      },
      {
        "status": "affected",
        "version": "755"
      },
      {
        "status": "affected",
        "version": "756"
      },
      {
        "status": "affected",
        "version": "757"
      },
      {
        "status": "affected",
        "version": "791"
      }
    ]
  }
]

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H

9.1 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.5%

Related for CVE-2023-27269