All the vulnerabilites related to SAP_SE - SAP ECC and SAP S/4HANA (IS-OIL)
cve-2023-36922
Vulnerability from cvelistv5
Published
2023-07-11 02:56
Modified
2024-08-02 17:01
Severity ?
Summary
Due to programming error in function module and report, IS-OIL component in SAP ECC and SAP S/4HANA allows an authenticated attacker to inject an arbitrary operating system command into an unprotected parameter in a common (default) extension.  On successful exploitation, the attacker can read or modify the system data as well as shut down the system.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T17:01:09.981Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://me.sap.com/notes/3350297"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SAP ECC and SAP S/4HANA (IS-OIL)",
          "vendor": "SAP_SE",
          "versions": [
            {
              "status": "affected",
              "version": "IS-OIL 600"
            },
            {
              "status": "affected",
              "version": "IS-OIL 602"
            },
            {
              "status": "affected",
              "version": "IS-OIL 603"
            },
            {
              "status": "affected",
              "version": "IS-OIL 604"
            },
            {
              "status": "affected",
              "version": "IS-OIL 605"
            },
            {
              "status": "affected",
              "version": "IS-OIL 606"
            },
            {
              "status": "affected",
              "version": "IS-OIL 617"
            },
            {
              "status": "affected",
              "version": "IS-OIL 618"
            },
            {
              "status": "affected",
              "version": "IS-OIL 800"
            },
            {
              "status": "affected",
              "version": "IS-OIL 802"
            },
            {
              "status": "affected",
              "version": "IS-OIL 803"
            },
            {
              "status": "affected",
              "version": "IS-OIL 804"
            },
            {
              "status": "affected",
              "version": "IS-OIL 805"
            },
            {
              "status": "affected",
              "version": "IS-OIL 806"
            },
            {
              "status": "affected",
              "version": "IS-OIL 807"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDue to programming error in function module and report, IS-OIL component in SAP ECC and SAP S/4HANA allows an authenticated attacker to inject an arbitrary operating system command into an unprotected parameter in a common (default) extension. \u0026nbsp;On successful exploitation, the attacker can read or modify the system data as well as shut down the system.\u003c/span\u003e\u003c/p\u003e"
            }
          ],
          "value": "Due to programming error in function module and report, IS-OIL component in SAP ECC and SAP S/4HANA allows an authenticated attacker to inject an arbitrary operating system command into an unprotected parameter in a common (default) extension. \u00a0On successful exploitation, the attacker can read or modify the system data as well as shut down the system.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "eng",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-09T16:39:50.007Z",
        "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
        "shortName": "sap"
      },
      "references": [
        {
          "url": "https://me.sap.com/notes/3350297"
        },
        {
          "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "OS command injection vulnerability in SAP ECC and SAP S/4HANA (IS-OIL)",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
    "assignerShortName": "sap",
    "cveId": "CVE-2023-36922",
    "datePublished": "2023-07-11T02:56:55.299Z",
    "dateReserved": "2023-06-27T21:23:26.299Z",
    "dateUpdated": "2024-08-02T17:01:09.981Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}