SAP NetWeaver Application Server for Java is affected by multiple vulnerabilities, as disclosed in the November SAP Security Patch Day advisory, including the following:
SAP NetWeaver AS Java GRMG Heartbeat application version 7.50 allows an unauthenticated attacker to send a crafted request from a vulnerable web application, causing limited impact on confidentiality and integrity of the application. (CVE-2023-42477)
SAP NetWeaver AS Java Logon application version 7.50 allows an unauthenticated attacker to brute force the login functionality to identify legitimate user ids. This will have an impact on confidentiality but there is no other impact on integrity or availability. (CVE-2023-42480)
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
##
include('compat.inc');
if (description)
{
script_id(185736);
script_version("1.2");
script_set_attribute(attribute:"plugin_modification_date", value:"2023/11/16");
script_cve_id("CVE-2023-42477", "CVE-2023-42480");
script_xref(name:"IAVA", value:"2023-A-0614");
script_name(english:"SAP NetWeaver AS Java Multiple Vulnerabilities (November 2023)");
script_set_attribute(attribute:"synopsis", value:
"The remote SAP NetWeaver application server is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"SAP NetWeaver Application Server for Java is affected by multiple vulnerabilities, as disclosed in the
November SAP Security Patch Day advisory, including the following:
- SAP NetWeaver AS Java GRMG Heartbeat application version 7.50 allows an unauthenticated attacker to send a
crafted request from a vulnerable web application, causing limited impact on confidentiality and integrity
of the application. (CVE-2023-42477)
- SAP NetWeaver AS Java Logon application version 7.50 allows an unauthenticated attacker to brute force the
login functionality to identify legitimate user ids. This will have an impact on confidentiality but there
is no other impact on integrity or availability. (CVE-2023-42480)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://me.sap.com/notes/3366410");
script_set_attribute(attribute:"see_also", value:"https://me.sap.com/notes/3333426");
script_set_attribute(attribute:"solution", value:
"Apply the appropriate patch according to the vendor advisory.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2023-42477");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2023/11/14");
script_set_attribute(attribute:"patch_publication_date", value:"2023/11/14");
script_set_attribute(attribute:"plugin_publication_date", value:"2023/11/15");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:sap:netweaver_application_server");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Web Servers");
script_copyright(english:"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("sap_netweaver_as_web_detect.nbin");
script_require_keys("installed_sw/SAP Netweaver Application Server (AS)", "Settings/ParanoidReport");
script_require_ports("Services/www", 80, 443, 8000, 50000);
exit(0);
}
include('vcf_extras_sap.inc');
if (report_paranoia < 2) audit(AUDIT_PARANOID);
var app_info = vcf::sap_netweaver_as::get_app_info();
var constraints = [
{'equal' : '7.50', 'fixed_display' : 'See vendor advisory' }
];
vcf::sap_netweaver_as::check_version_and_report(
app_info:app_info,
constraints:constraints,
severity:SECURITY_WARNING
);
Vendor | Product | Version | CPE |
---|---|---|---|
sap | netweaver_application_server | cpe:/a:sap:netweaver_application_server |