Advisory
On 11.04.2023 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within Java.
SAP Note 3305369 addresses "[CVE-2023-27497] Multiple vulnerabilities in SAP Diagnostics Agent (OSCommand Bridge and EventLogServiceCollector)" to prevent remote code execution with a hot news risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
Because of a missing authentication and input sanitization of code, the EventLogServiceCollector allows an attacker to execute malicious scripts on all connected Diagnostics Agents running on Windows. Additionally, the OSCommand Bridge allows an attacker to execute malicious scripts on all connected Diagnostics Agents running on all the Operating Systems.Solution
The EventLogServiceCollector and OSCommand Bridge components have been removed from SAP Diagnostics Agent.
Affected System
SAP Netweaver Application Server Java is part of the SAP NetWeaver Application Platform. It provides the complete infrastructure for deploying and running Java applications.
- The AS Java Home: SAP Netweaver Application Server Java wiki
- A dedicated SAP NetWeaver 7.40 Application Server for Java Security Guide exists.
The advisory is valid for
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP HANA Extended Application Services
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Customer Profitability Analytics
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Customer Checkout
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in in SAP Business One Cloud
- 9.8 [CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Commerce