Advisory
On 14.02.2023 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP Host Agent.
SAP Note 3285757 addresses "[CVE-2023-24523] Privilege Escalation vulnerability in SAP Host Agent (Start Service)" to prevent os command injection with a high risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
An authenticated attacker with local access to the SAP Host Agent Server port can submit specially crafted web service requests with OS commands that get executed with admin privileges.Solution
Host Agent no longer executes OS commands provided by this method.
- 9.9 [CVE-2021-37531] Code Injection vulnerability in SAP NetWeaver Knowledge Management (XMLForms)
- 9.1 Update 1 to 3350297 - [CVE-2023-36922] OS command injection vulnerability in SAP ECC and SAP S/4HANA (IS-OIL)
- 9.1 [CVE-2023-36922] OS command injection vulnerability in SAP ECC and SAP S/4HANA (IS-OIL)
- 9.1 Update 2 to Security Note 2808158: [CVE-2019-0330] OS Command Injection vulnerability in SAP Diagnostics Agent
- 9.1 [CVE-2020-26820] Privilege escalation in SAP NetWeaver Application Server for Java (UDDI Server)