Advisory
On 08.08.2023 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP PowerDesigner.
SAP Note 3341460 addresses "[CVE-2023-37483] Multiple Vulnerabilities in SAP PowerDesigner" to prevent sql injection with a hot news risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
SAP Power Designer allows an unauthenticated attacker to run arbitrary queries against the back-end database due to improper authentication and authorization check in SAP PowerDesigner Proxy.Solution
The registry to disable Client/ Proxy encryption for debugging purposes is now ignored, and additional registry entries to control proxy side access were added.
- 9.9 [CVE-2021-38176] SQL Injection vulnerability in SAP NZDT Mapping Table Framework
- 9.9 [CVE-2023-0016] SQL Injection vulnerability in SAP Business Planning and Consolidation MS
- 9.1 [CVE-2021-33701] SQL Injection vulnerability in SAP NZDT Row Count Reconciliation
- 8.8 [CVE-2021-42064] SQL Injection vulnerability in SAP Commerce
- 7.2 SQL injection vulnerability in Database Monitors for Oracle