First published: Tue Feb 14 2023(Updated: )
SAP NetWeaver AS for ABAP and ABAP Platform - versions 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, 790, allows an unauthenticated attacker to craft a link, which when clicked by an unsuspecting user can be used to redirect a user to a malicious site which could read or modify some sensitive information or expose the victim to a phishing attack.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver Application Server ABAP | =740 | |
SAP NetWeaver Application Server ABAP | =750 | |
SAP NetWeaver Application Server ABAP | =751 | |
SAP NetWeaver Application Server ABAP | =752 | |
SAP NetWeaver Application Server ABAP | =753 | |
SAP NetWeaver Application Server ABAP | =754 | |
SAP NetWeaver Application Server ABAP | =755 | |
SAP NetWeaver Application Server ABAP | =756 | |
SAP NetWeaver Application Server ABAP | =757 | |
SAP NetWeaver Application Server ABAP | =789 | |
SAP NetWeaver Application Server ABAP | =790 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23860 is a vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform that allows an unauthenticated attacker to craft a link, which when clicked by an unsuspecting user can be used to redirect the user to a malicious site.
Versions 740, 750, 751, 752, 753, 754, 755, 756, 757, 789, and 790 of SAP NetWeaver AS for ABAP and ABAP Platform are affected by CVE-2023-23860.
CVE-2023-23860 has a severity rating of 6.1, which is considered medium.
An unauthenticated attacker can exploit CVE-2023-23860 by crafting a malicious link and tricking an unsuspecting user into clicking it, which will then redirect the user to a malicious site.
More information about CVE-2023-23860 can be found at the SAP Support Portal (https://launchpad.support.sap.com/#/notes/3268959) and the SAP website (https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html).