Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-35870— Improper Access Control in SAP S/4HANA (Manage Journal Entry Template)

CVSS 6.3 · Medium EPSS 0.13% · P31
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-35870

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Improper Access Control in SAP S/4HANA (Manage Journal Entry Template)
Source: NVD (National Vulnerability Database)
Vulnerability Description
When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
关键资源的不正确权限授予
Source: NVD (National Vulnerability Database)
Vulnerability Title
SAP S/4HANA 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SAP S/4HANA是德国思爱普(SAP)公司的一个基于 SAP HANA 内存数据库系统的的企业资源管理软件。 SAP S/4HANA 存在安全漏洞,该漏洞源于可以拦截保存请求并更改模板,从而影响资源的机密性和完整性。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SAP_SESAP S/4HANA (Manage Journal Entry Template) S4CORE 104 -

II. Public POCs for CVE-2023-35870

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-35870

登录查看更多情报信息。

Same Patch Batch · SAP_SE · 2023-07-11 · 18 CVEs total

CVE-2023-369229.1 CRITICALOS command injection vulnerability in SAP ECC and SAP S/4HANA (IS-OIL)
CVE-2023-339898.7 HIGHDirectory Traversal vulnerability in SAP NetWeaver (BI CONT ADD ON)
CVE-2023-339878.6 HIGHRequest smuggling and request concatenation in SAP Web Dispatcher
CVE-2023-339907.8 HIGHDenial of Service (DoS) vulnerability in SAP SQL Anywhere
CVE-2023-358717.7 HIGHMemory Corruption vulnerability in SAP Web Dispatcher
CVE-2023-369257.2 HIGHUnauthenticated blind SSRF in SAP Solution Manager (Diagnostics agent)
CVE-2023-369217.2 HIGHHeader Injection in SAP Solution Manager (Diagnostic Agent)
CVE-2023-358736.5 MEDIUMMissing Authentication check in SAP NetWeaver Process Integration (Runtime Workbench)
CVE-2023-358726.5 MEDIUMMissing Authentication check in SAP NetWeaver Process Integration (Message Display Tool)
CVE-2023-369186.1 MEDIUMCross-Site Scripting vulnerability in SAP Enable Now
CVE-2023-339886.1 MEDIUMCross-Site Scripting vulnerability in SAP Enable Now
CVE-2023-358746.0 MEDIUMImproper authentication vulnerability in SAP NetWeaver AS ABAP and ABAP Platform
CVE-2023-369175.9 MEDIUMPassword Change rate limit bypass in SAP BusinessObjects Business Intelligence Platform
CVE-2023-314055.3 MEDIUMLog Injection vulnerability in SAP NetWeaver AS for Java (Log Viewer)
CVE-2023-369195.3 MEDIUMInformation Disclosure in SAP Enable Now
CVE-2023-369244.9 MEDIUMLog Injection vulnerability in SAP ERP Defense Forces and Public Security
CVE-2023-339924.5 MEDIUMMissing Authorization Check in SAP Business Warehouse and SAP BW/4HANA

IV. Related Vulnerabilities

V. Comments for CVE-2023-35870

No comments yet


Leave a comment