
CVE-2023-23859
https://notcve.org/view.php?id=CVE-2023-23859
14 Feb 2023 — SAP NetWeaver AS for ABAP and ABAP Platform - versions 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, allows an unauthenticated attacker to craft a malicious link, which when clicked by an unsuspecting user, can be used to read or modify some sensitive information. • https://launchpad.support.sap.com/#/notes/3268959 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-23858
https://notcve.org/view.php?id=CVE-2023-23858
14 Feb 2023 — Due to insufficient input validation, SAP NetWeaver AS for ABAP and ABAP Platform - versions 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, allows an unauthenticated attacker to send a crafted URL to a user, and by clicking the URL, the tricked user accesses SAP and might be directed with the response to somewhere out-side SAP and enter sensitive data. This could cause a limited impact on confidentiality and integrity of the application. • https://launchpad.support.sap.com/#/notes/3293786 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-23856
https://notcve.org/view.php?id=CVE-2023-23856
14 Feb 2023 — In SAP BusinessObjects Business Intelligence (Web Intelligence user interface) - version 430, some calls return json with wrong content type in the header of the response. As a result, a custom application that calls directly the jsp of Web Intelligence DHTML may be vulnerable to XSS attacks. On successful exploitation an attacker can cause a low impact on integrity of the application. • https://launchpad.support.sap.com/#/notes/3263863 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-23855
https://notcve.org/view.php?id=CVE-2023-23855
14 Feb 2023 — SAP Solution Manager - version 720, allows an authenticated attacker to redirect users to a malicious site due to insufficient URL validation. A successful attack could lead an attacker to read or modify the information or expose the user to a phishing attack. As a result, it has a low impact to confidentiality, integrity and availability. • https://launchpad.support.sap.com/#/notes/3270509 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2023-23854
https://notcve.org/view.php?id=CVE-2023-23854
14 Feb 2023 — SAP NetWeaver Application Server for ABAP and ABAP Platform - versions 700, 701, 702, 731, 740, 750, 751, 752, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. • https://launchpad.support.sap.com/#/notes/3287291 • CWE-862: Missing Authorization •

CVE-2023-23853
https://notcve.org/view.php?id=CVE-2023-23853
14 Feb 2023 — An unauthenticated attacker in AP NetWeaver Application Server for ABAP and ABAP Platform - versions 700, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, can craft a link which when clicked by an unsuspecting user can be used to redirect a user to a malicious site which could read or modify some sensitive information or expose the victim to a phishing attack. Vulnerability has no direct impact on availability. • https://launchpad.support.sap.com/#/notes/3271227 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2023-23852
https://notcve.org/view.php?id=CVE-2023-23852
14 Feb 2023 — SAP Solution Manager (System Monitoring) - version 720, does not sufficiently encode user-controlled inputs, resulting in Cross-Site Scripting (XSS) vulnerability. • https://launchpad.support.sap.com/#/notes/3266751 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-23851
https://notcve.org/view.php?id=CVE-2023-23851
14 Feb 2023 — SAP Business Planning and Consolidation - versions 200, 300, allows an attacker with business authorization to upload any files (including web pages) without the proper file format validation. If other users visit the uploaded malicious web page, the attacker may perform actions on behalf of the users without their consent impacting the confidentiality and integrity of the system. • https://launchpad.support.sap.com/#/notes/3275841 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2023-0025
https://notcve.org/view.php?id=CVE-2023-0025
14 Feb 2023 — SAP Solution Manager (BSP Application) - version 720, allows an authenticated attacker to craft a malicious link, which when clicked by an unsuspecting user, can be used to read or modify some sensitive information or craft a payload which may restrict access to the desired resources. • https://launchpad.support.sap.com/#/notes/3267442 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-0024
https://notcve.org/view.php?id=CVE-2023-0024
14 Feb 2023 — SAP Solution Manager (BSP Application) - version 720, allows an authenticated attacker to craft a malicious link, which when clicked by an unsuspecting user, can be used to read or modify some sensitive information or craft a payload which may restrict access to the desired resources, resulting in Cross-Site Scripting vulnerability. • https://launchpad.support.sap.com/#/notes/3265846 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •