Advisory
On 12.07.2022 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP Business One .
SAP Note 3191012 addresses "[CVE-2022-31593] Code Injection vulnerability in SAP Business One" to prevent code injection with a high risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
SAP Business One client allows an attacker with low privileges to inject code that can be executed by the application, thereby controlling the application's behavior.Solution
The attachments upload mechanism of the SAP Business One client has been enhanced with the ability to refuse uploading files of certain types, thus preventing dangerous files from spreading to other users or running in the system.
- 9.9 [CVE-2022-41203] Insecure Deserialization of Untrusted Data in SAP BusinessObjects Business Intelligence Platform (Central Management Console and BI Launchpad)
- 9.9 [CVE-2021-27602] Remote Code Execution vulnerability in Source Rules of SAP Commerce
- 9.9 [CVE-2021-21466] Code Injection in SAP Business Warehouse and SAP BW/4HANA
- 9.1 [CVE-2020-26838] Code Injection vulnerability in SAP Business Warehouse (Master Data Management) and SAP BW4HANA
- 9.1 [CVE-2020-6318] Code Injection vulnerability in SAP NetWeaver (ABAP Server) and ABAP Platform