CVE-2023-50424 – Escalation of Privileges in SAP BTP Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go)
https://notcve.org/view.php?id=CVE-2023-50424
SAP BTP Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) - versions < 0.17.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application. SAP BTP Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go): versiones < 0.17.0, permiten, bajo ciertas condiciones, una escalada de privilegios. Si la explotación tiene éxito, un atacante no autenticado puede obtener permisos arbitrarios dentro de la aplicación. • https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067 https://github.com/SAP/cloud-security-client-go https://github.com/SAP/cloud-security-services-integration-library/security/advisories/GHSA-59c9-pxq8-9c73 https://me.sap.com/notes/3411067 https://pkg.go.dev/github.com/sap/cloud-security-client-go@v0.17.0 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-269: Improper Privilege Management CWE-749: Exposed Dangerous Method or Function •
CVE-2023-50423 – Escalation of Privileges in SAP BTP Security Services Integration Library ([Python] cloud-pysec)
https://notcve.org/view.php?id=CVE-2023-50423
SAP BTP Security Services Integration Library ([Python] sap-xssec) - versions < 4.1.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application. SAP BTP Security Services Integration Library ([Python] sap-xssec): las versiones < 4.1.0 permiten, bajo ciertas condiciones, una escalada de privilegios. Si la explotación tiene éxito, un atacante no autenticado puede obtener permisos arbitrarios dentro de la aplicación. • https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067 https://github.com/SAP/cloud-pysec https://github.com/SAP/cloud-pysec/security/advisories/GHSA-6mjg-37cp-42x5 https://me.sap.com/notes/3411067 https://pypi.org/project/sap-xssec https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-269: Improper Privilege Management CWE-749: Exposed Dangerous Method or Function •
CVE-2023-6542 – Improper Export of Android Application Components in SAP EMARSYS SDK ANDROID
https://notcve.org/view.php?id=CVE-2023-6542
Due to lack of proper authorization checks in Emarsys SDK for Android, an attacker can call a particular activity and can forward himself web pages and/or deep links without any validation directly from the host application. On successful attack, an attacker could navigate to arbitrary URL including application deep links on the device. Debido a la falta de controles de autorización adecuados en Emarsys SDK para Android, un atacante puede llamar a una actividad particular y reenviarse páginas web y/o enlaces profundos sin ninguna validación directamente desde la aplicación host. En caso de un ataque exitoso, un atacante podría navegar a una URL arbitraria, incluidos enlaces profundos de aplicaciones en el dispositivo. • https://me.sap.com/notes/3406244 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-863: Incorrect Authorization •
CVE-2023-49587 – Command Injection vulnerability in SAP Solution Manager
https://notcve.org/view.php?id=CVE-2023-49587
SAP Solution Manager - version 720, allows an authorized attacker to execute certain deprecated function modules which can read or modify data of same or other component without user interaction over the network. SAP Solution Manager: versión 720, permite a un atacante autorizado ejecutar ciertos módulos de funciones obsoletos que pueden leer o modificar datos del mismo u otro componente sin interacción del usuario a través de la red. • https://me.sap.com/notes/3395306 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2023-49584 – Client-Side Desynchronization vulnerability in SAP Fiori Launchpad
https://notcve.org/view.php?id=CVE-2023-49584
SAP Fiori launchpad - versions SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, UI_700 200, SAP_BASIS 793, allows an attacker to use HTTP verb POST on read-only service causing low impact on Confidentiality of the application. Plataforma de lanzamiento de SAP Fiori: versiones SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, UI_700 200, SAP_BASIS 793, permite a un atacante utilizar el verbo HTTP POST en un servicio de solo lectura, lo que provoca un bajo impacto en la confidencialidad de la aplicación. • https://me.sap.com/notes/3406786 https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •