Lucene search

K
nessusThis script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.SAP_NETWEAVER_AS_JAVA_NOV_2023.NASL
HistoryNov 15, 2023 - 12:00 a.m.

SAP NetWeaver AS Java Multiple Vulnerabilities (November 2023)

2023-11-1500:00:00
This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
3
sap netweaver
java
vulnerabilities
security patch day
grmg heartbeat
logon
brute force
confidentiality
integrity
nessus

5.6 Medium

AI Score

Confidence

High

SAP NetWeaver Application Server for Java is affected by multiple vulnerabilities, as disclosed in the November SAP Security Patch Day advisory, including the following:

  • SAP NetWeaver AS Java GRMG Heartbeat application version 7.50 allows an unauthenticated attacker to send a crafted request from a vulnerable web application, causing limited impact on confidentiality and integrity of the application. (CVE-2023-42477)

  • SAP NetWeaver AS Java Logon application version 7.50 allows an unauthenticated attacker to brute force the login functionality to identify legitimate user ids. This will have an impact on confidentiality but there is no other impact on integrity or availability. (CVE-2023-42480)

Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##

include('compat.inc');

if (description)
{
  script_id(185736);
  script_version("1.2");
  script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/16");

  script_cve_id("CVE-2023-42477", "CVE-2023-42480");
  script_xref(name:"IAVA", value:"2023-A-0614");

  script_name(english:"SAP NetWeaver AS Java Multiple Vulnerabilities (November 2023)");

  script_set_attribute(attribute:"synopsis", value:
"The remote SAP NetWeaver application server is affected by multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"SAP NetWeaver Application Server for Java is affected by multiple vulnerabilities, as disclosed in the
November SAP Security Patch Day advisory, including the following:

  - SAP NetWeaver AS Java GRMG Heartbeat application version 7.50 allows an unauthenticated attacker to send a
  crafted request from a vulnerable web application, causing limited impact on confidentiality and integrity
  of the application. (CVE-2023-42477)

  - SAP NetWeaver AS Java Logon application version 7.50 allows an unauthenticated attacker to brute force the
  login functionality to identify legitimate user ids. This will have an impact on confidentiality but there
  is no other impact on integrity or availability. (CVE-2023-42480)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
  script_set_attribute(attribute:"see_also", value:"https://me.sap.com/notes/3366410");
  script_set_attribute(attribute:"see_also", value:"https://me.sap.com/notes/3333426");
  script_set_attribute(attribute:"solution", value:
"Apply the appropriate patch according to the vendor advisory.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-42477");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2023/11/14");
  script_set_attribute(attribute:"patch_publication_date", value:"2023/11/14");
  script_set_attribute(attribute:"plugin_publication_date", value:"2023/11/15");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:sap:netweaver_application_server");
  script_set_attribute(attribute:"stig_severity", value:"I");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Web Servers");

  script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("sap_netweaver_as_web_detect.nbin");
  script_require_keys("installed_sw/SAP Netweaver Application Server (AS)", "Settings/ParanoidReport");
  script_require_ports("Services/www", 80, 443, 8000, 50000);

  exit(0);
}

include('vcf_extras_sap.inc');

if (report_paranoia < 2) audit(AUDIT_PARANOID);

var app_info = vcf::sap_netweaver_as::get_app_info();

var constraints = [
  {'equal' : '7.50', 'fixed_display' : 'See vendor advisory' }
];

vcf::sap_netweaver_as::check_version_and_report(
  app_info:app_info,
  constraints:constraints,
  severity:SECURITY_WARNING
);
VendorProductVersionCPE
sapnetweaver_application_servercpe:/a:sap:netweaver_application_server

5.6 Medium

AI Score

Confidence

High

Related for SAP_NETWEAVER_AS_JAVA_NOV_2023.NASL