Advisory
A note with CVSS 5.3 for component BC-JAS-SEC was released by SAP on 11.07.2023. The correction/advisory 3324732 was described with "[CVE-2023-31405] Log Injection vulnerability in SAP NetWeaver AS for Java (Log Viewer)" and affects the system type Java.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance.
The vulnerability addressed is log injection within Java.
Risk specification
Update: This note has been re-released with minor textual changes in the 'Solution' section. SAP NetWeaver AS for Java allows an unauthenticated attacker to craft a request over the network which can result in unwarranted modifications to a system log without user interaction.Solution
Log Viewer in SAP NetWeaver AS for Java has been updated so that encoding and validation of user input is now added.
Affected System
SAP Netweaver Application Server Java is part of the SAP NetWeaver Application Platform. It provides the complete infrastructure for deploying and running Java applications.
- The AS Java Home: SAP Netweaver Application Server Java wiki
- A dedicated SAP NetWeaver 7.40 Application Server for Java Security Guide exists.
The advisory is valid for
- 5.3 [CVE-2020-6227] Remote unauthenticated log injection in SAP Business Objects Business Intelligence Platform (CMS / Auditing issues)
- 5.3 Update 1 to Security Note 3324732: [CVE-2023-31405] Log Injection vulnerability in SAP NetWeaver AS for Java (Log Viewer)
- 4.9 [CVE-2023-36924] Log Injection vulnerability in SAP ERP Defense Forces and Public Security