Advisory
A note with CVSS 5.3 for component SBO-CRO-SEC was released by SAP on 08.08.2023. The correction/advisory 3333616 was described with "[CVE-2023-37487] Security Misconfiguration vulnerability in SAP Business One (Service Layer)" and affects the system type SAP Business One.
A workaround exists, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance.
The vulnerability addressed is information disclosure within SAP Business One.
Information disclosure is when an application fails to properly protect sensitive and confidential information from
parties that are not supposed to have access to the subject matter in normal circumstances.
Carefully review every information disclosure vulnerablity in regards to disclosure obligations post-GDPR for
‘Personal data’ under the Data Protection Act 2018.
Risk specification
An authenticated attacker could leverage a vulnerability in SAP Business One to obtain confidential data from the system that would otherwise be restricted.Solution
The application no longer allows this kind of attack. Although an alternative solution exists, it is advisable to apply the correction! This is the workaround, which was suggested by the SAP security experts: "As a workaround, it is possible to configure one node of the system to handle login requests sequentially to prevent this type of attack. Please see the note for more details.".
- 9.9 [CVE-2023-40622] Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Promotion Management)
- 9.8 [CVE-2023-28765] Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Promotion Management )
- 9.1 [CVE-2023-28762] Information Disclosure in SAP BusinessObjects Business Intelligence Platform (Central Management Console)
- 9.0 [CVE-2020-6252] Information Disclosure in SAP Adaptive Server Enterprise (Cockpit)
- 8.9 Information Disclosure in Central Order