Lucene search

K
cve[email protected]CVE-2023-36922
HistoryJul 11, 2023 - 3:15 a.m.

CVE-2023-36922

2023-07-1103:15:10
CWE-78
web.nvd.nist.gov
89
sap
netweaver
abap
is-oil
programming error
cve-2023-36922
vulnerability
security
nvd
operating system command

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.7%

Due to programming error in function module and report, IS-OIL component in SAP ECC and SAP S/4HANA allows an authenticated attacker to inject an arbitrary operating system command into an unprotected parameter in a common (default) extension. Β On successful exploitation, the attacker can read or modify the system data as well as shut down the system.

Affected configurations

NVD
Node
sapnetweaverMatch600
OR
sapnetweaverMatch602
OR
sapnetweaverMatch603
OR
sapnetweaverMatch604
OR
sapnetweaverMatch605
OR
sapnetweaverMatch606
OR
sapnetweaverMatch617
OR
sapnetweaverMatch618
OR
sapnetweaverMatch800
OR
sapnetweaverMatch802
OR
sapnetweaverMatch803
OR
sapnetweaverMatch804
OR
sapnetweaverMatch805
OR
sapnetweaverMatch806
OR
sapnetweaverMatch807

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "SAP ECC and SAP S/4HANA (IS-OIL)",
    "vendor": "SAP_SE",
    "versions": [
      {
        "status": "affected",
        "version": "IS-OIL 600"
      },
      {
        "status": "affected",
        "version": "IS-OIL 602"
      },
      {
        "status": "affected",
        "version": "IS-OIL 603"
      },
      {
        "status": "affected",
        "version": "IS-OIL 604"
      },
      {
        "status": "affected",
        "version": "IS-OIL 605"
      },
      {
        "status": "affected",
        "version": "IS-OIL 606"
      },
      {
        "status": "affected",
        "version": "IS-OIL 617"
      },
      {
        "status": "affected",
        "version": "IS-OIL 618"
      },
      {
        "status": "affected",
        "version": "IS-OIL 800"
      },
      {
        "status": "affected",
        "version": "IS-OIL 802"
      },
      {
        "status": "affected",
        "version": "IS-OIL 803"
      },
      {
        "status": "affected",
        "version": "IS-OIL 804"
      },
      {
        "status": "affected",
        "version": "IS-OIL 805"
      },
      {
        "status": "affected",
        "version": "IS-OIL 806"
      },
      {
        "status": "affected",
        "version": "IS-OIL 807"
      }
    ]
  }
]

9.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

8.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

33.7%

Related for CVE-2023-36922