First published: Tue Jul 11 2023(Updated: )
An unauthenticated attacker in SAP Web Dispatcher - versions WEBDISP 7.49, WEBDISP 7.53, WEBDISP 7.54, WEBDISP 7.77, WEBDISP 7.81, WEBDISP 7.85, WEBDISP 7.88, WEBDISP 7.89, WEBDISP 7.90, KERNEL 7.49, KERNEL 7.53, KERNEL 7.54 KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.88, KERNEL 7.89, KERNEL 7.90, KRNL64NUC 7.49, KRNL64UC 7.49, KRNL64UC 7.53, HDB 2.00, XS_ADVANCED_RUNTIME 1.00, SAP_EXTENDED_APP_SERVICES 1, can submit a malicious crafted request over a network to a front-end server which may, over several attempts, result in a back-end server confusing the boundaries of malicious and legitimate messages. This can result in the back-end server executing a malicious payload which can be used to read or modify information on the server or make it temporarily unavailable.
Credit: cna@sap.com cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Web Dispatcher | =7.53 | |
SAP Web Dispatcher | =7.77 | |
SAP Web Dispatcher | =7.81 | |
SAP Web Dispatcher | =7.49 | |
SAP Web Dispatcher | =7.85 | |
SAP Web Dispatcher | =7.89 | |
SAP Web Dispatcher | =krnl64uc_7.53 | |
SAP Web Dispatcher | =krnl64nuc_7.49 | |
SAP Web Dispatcher | =kernel_7.49 | |
SAP Web Dispatcher | =kernel_7.53 | |
SAP Web Dispatcher | =kernel_7.54 | |
SAP Web Dispatcher | =kernel_7.77 | |
SAP Web Dispatcher | =kernel_7.81 | |
SAP Web Dispatcher | =kernel_7.85 | |
SAP Web Dispatcher | =kernel_7.89 | |
SAP Web Dispatcher | =kernel_7.88 | |
SAP Web Dispatcher | =kernel_7.90 | |
SAP Web Dispatcher | =7.54 | |
SAP Web Dispatcher | =7.88 | |
SAP Web Dispatcher | =7.90 | |
SAP Web Dispatcher | =krnl64uc_7.49 | |
SAP Web Dispatcher | =hdb_2.00 | |
SAP Web Dispatcher | =xs_advanced_runtime_1.00 | |
SAP Web Dispatcher | =sap_extended_app_services_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-33987 is critical.
Versions WEBDISP 7.49, WEBDISP 7.53, WEBDISP 7.54, WEBDISP 7.77, WEBDISP 7.81, WEBDISP 7.85, WEBDISP 7.88, WEBDISP 7.89, WEBDISP 7.90, KERNEL 7.49, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.88, KERNEL 7.89, KERNEL 7.9 of SAP Web Dispatcher are affected.
An unauthenticated attacker can exploit CVE-2023-33987 by taking advantage of a vulnerability in SAP Web Dispatcher.
Yes, fixes and patches are available for CVE-2023-33987. Please refer to the SAP Security Note 3233899 for more information.
You can find more information about CVE-2023-33987 in the SAP Security Note 3233899 and the SAP document provided in the references.