Advisory
On 12.09.2023 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within Java.
SAP Note 3348142 addresses "[CVE-2023-41367] Missing Authentication check in SAP NetWeaver (Guided Procedures)" to prevent missing authentication check with a medium risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process, the team suggests.
Risk specification
SAP NetWeaver allows unauthenticated attacker to view user email addresses due to a missing authentication check in the webdynpro application.Solution
An appropriate authentication check was added to the application.
Affected System
SAP Netweaver Application Server Java is part of the SAP NetWeaver Application Platform. It provides the complete infrastructure for deploying and running Java applications.
- The AS Java Home: SAP Netweaver Application Server Java wiki
- A dedicated SAP NetWeaver 7.40 Application Server for Java Security Guide exists.
The advisory is valid for
- 10.0 [CVE-2020-6207] Missing Authentication Check in SAP Solution Manager (User-Experience Monitoring)
- 10.0 [CVE-2020-26829] Missing Authentication Check in SAP NetWeaver AS JAVA (P2P Cluster Communication)
- 9.9 [CVE-2023-23857] Improper Access Control in SAP NetWeaver AS for Java
- 9.8 [CVE-2024-41730] Missing Authentication check in SAP BusinessObjects Business Intelligence Platform
- 9.8 [CVE-2020-6198] Missing Authentication check in SAP Solution Manager (Diagnostics Agent)