First published: Tue Jul 11 2023(Updated: )
Due to programming error in function module and report, IS-OIL component in SAP ECC and SAP S/4HANA allows an authenticated attacker to inject an arbitrary operating system command into an unprotected parameter in a common (default) extension. On successful exploitation, the attacker can read or modify the system data as well as shut down the system.
Credit: cna@sap.com
Affected Software | Affected Version | How to fix |
---|---|---|
SAP NetWeaver | =600 | |
SAP NetWeaver | =602 | |
SAP NetWeaver | =603 | |
SAP NetWeaver | =604 | |
SAP NetWeaver | =605 | |
SAP NetWeaver | =606 | |
SAP NetWeaver | =617 | |
SAP NetWeaver | =618 | |
SAP NetWeaver | =800 | |
SAP NetWeaver | =802 | |
SAP NetWeaver | =803 | |
SAP NetWeaver | =804 | |
SAP NetWeaver | =805 | |
SAP NetWeaver | =806 | |
SAP NetWeaver | =807 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-36922 is critical.
The common vulnerability and exposure ID for SAP NetWeaver ABAP (IS-OIL) version 600 is CVE-2023-36922.
CVE-2023-36922 allows an authenticated attacker to inject an arbitrary operating system command into an unprotected parameter in a common (default) module or report.
Apply the necessary security patches provided by SAP to fix CVE-2023-36922 in SAP NetWeaver ABAP (IS-OIL).
You can find more information about CVE-2023-36922 at the following references: [Link 1](https://me.sap.com/notes/3350297) and [Link 2](https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html).