Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-36924— Log Injection vulnerability in SAP ERP Defense Forces and Public Security

CVSS 4.9 · Medium EPSS 0.14% · P34
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-36924

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Log Injection vulnerability in SAP ERP Defense Forces and Public Security
Source: NVD (National Vulnerability Database)
Vulnerability Description
While using a specific function, SAP ERP Defense Forces and Public Security - versions 600, 603, 604, 605, 616, 617, 618, 802, 803, 804, 805, 806, 807, allows an authenticated attacker with admin privileges to write arbitrary data to the syslog file. On successful exploitation, an attacker could modify all the syslog data causing a complete compromise of integrity of the application.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
日志输出的转义处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
SAP ERP 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SAP ERP是德国思爱普(SAP)公司的一系列用于ERP管理的软件。 SAP ERP Defense Forces and Public Security 存在安全漏洞,该漏洞源于具有管理员权限的经过身份验证的攻击者可以将任意数据写入系统日志文件。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SAP_SESAP ERP Defense Forces and Public Security 600 -

II. Public POCs for CVE-2023-36924

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-36924

登录查看更多情报信息。

Same Patch Batch · SAP_SE · 2023-07-11 · 18 CVEs total

CVE-2023-369229.1 CRITICALOS command injection vulnerability in SAP ECC and SAP S/4HANA (IS-OIL)
CVE-2023-339898.7 HIGHDirectory Traversal vulnerability in SAP NetWeaver (BI CONT ADD ON)
CVE-2023-339878.6 HIGHRequest smuggling and request concatenation in SAP Web Dispatcher
CVE-2023-339907.8 HIGHDenial of Service (DoS) vulnerability in SAP SQL Anywhere
CVE-2023-358717.7 HIGHMemory Corruption vulnerability in SAP Web Dispatcher
CVE-2023-369217.2 HIGHHeader Injection in SAP Solution Manager (Diagnostic Agent)
CVE-2023-369257.2 HIGHUnauthenticated blind SSRF in SAP Solution Manager (Diagnostics agent)
CVE-2023-358726.5 MEDIUMMissing Authentication check in SAP NetWeaver Process Integration (Message Display Tool)
CVE-2023-358736.5 MEDIUMMissing Authentication check in SAP NetWeaver Process Integration (Runtime Workbench)
CVE-2023-358706.3 MEDIUMImproper Access Control in SAP S/4HANA (Manage Journal Entry Template)
CVE-2023-369186.1 MEDIUMCross-Site Scripting vulnerability in SAP Enable Now
CVE-2023-339886.1 MEDIUMCross-Site Scripting vulnerability in SAP Enable Now
CVE-2023-358746.0 MEDIUMImproper authentication vulnerability in SAP NetWeaver AS ABAP and ABAP Platform
CVE-2023-369175.9 MEDIUMPassword Change rate limit bypass in SAP BusinessObjects Business Intelligence Platform
CVE-2023-369195.3 MEDIUMInformation Disclosure in SAP Enable Now
CVE-2023-314055.3 MEDIUMLog Injection vulnerability in SAP NetWeaver AS for Java (Log Viewer)
CVE-2023-339924.5 MEDIUMMissing Authorization Check in SAP Business Warehouse and SAP BW/4HANA

IV. Related Vulnerabilities

V. Comments for CVE-2023-36924

No comments yet


Leave a comment