Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-40624— Code Injection vulnerability in SAP NetWeaver AS ABAP (applications based on Unified Rendering)

CVSS 5.5 · Medium EPSS 0.11% · P29
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-40624

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Code Injection vulnerability in SAP NetWeaver AS ABAP (applications based on Unified Rendering)
Source: NVD (National Vulnerability Database)
Vulnerability Description
SAP NetWeaver AS ABAP (applications based on Unified Rendering) - versions SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, SAP_UI 758, SAP_BASIS 702, SAP_BASIS 731, allows an attacker to inject JavaScript code that can be executed in the web-application. An attacker could thereby control the behavior of this web-application.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Source: NVD (National Vulnerability Database)
Vulnerability Title
SAP NetWeaver AS 跨站脚本漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
SAP NetWeaver AS是德国思爱普(SAP)公司的一款SAP网络应用服务器。它不仅能提供网络服务,且还是SAP软件的基本平台。 SAP NetWeaver AS ABAP (applications based on Unified Rendering) SAP_UI 754、SAP_UI 755、SAP_UI 756、SAP_UI 757、SAP_UI 758、SAP_BASIS 702、SAP_BASIS 731版本存在跨站脚本漏洞,该漏洞源于允许攻击者在 Web 应用程序中执行的 Java
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
SAP_SESAP NetWeaver AS ABAP (applications based on Unified Rendering) SAP_UI 754 -

II. Public POCs for CVE-2023-40624

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-40624

登录查看更多情报信息。

Same Patch Batch · SAP_SE · 2023-09-12 · 12 CVEs total

CVE-2023-406229.9 CRITICALInformation Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform
CVE-2023-403099.8 CRITICALMissing Authorization check in SAP CommonCryptoLib
CVE-2023-424728.7 HIGHInsufficient File type validation in SAP BusinessObjects Business Intelligence Platform (W
CVE-2023-403087.5 HIGHMemory Corruption vulnerability in SAP CommonCryptoLib
CVE-2023-406216.3 MEDIUMCode Injection vulnerability in SAP PowerDesigner Client
CVE-2023-406236.2 MEDIUMArbitrary File Delete via Directory Junction in SAP BusinessObjects Suite(installer)
CVE-2023-406255.4 MEDIUMMissing Authorization check in SAP Manage Purchase Contracts App
CVE-2023-413675.3 MEDIUMMissing Authentication check in SAP NetWeaver (Guided Procedures)
CVE-2023-374895.3 MEDIUMInformation Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform
CVE-2023-413693.5 LOWExternal Entity Loop vulnerability in SAP S/4HANA (Create Single Payment application)
CVE-2023-413682.7 LOWInsecure Direct Object Reference (IDOR) vulnerability in S4 HANA (Manage checkbook apps)

IV. Related Vulnerabilities

V. Comments for CVE-2023-40624

No comments yet


Leave a comment