cve/2023/CVE-2023-30744.md

18 lines
1.1 KiB
Markdown
Raw Permalink Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-30744](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30744)
![](https://img.shields.io/static/v1?label=Product&message=SAP%20AS%20NetWeaver%20JAVA&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20SERVERCORE%207.50%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-306%3A%20Missing%20Authentication%20for%20Critical%20FunctionCWE-862%3A%20Missing%20Authorization&color=brighgreen)
### Description
In SAP AS NetWeaver JAVA - versions SERVERCORE 7.50, J2EE-FRMW 7.50, CORE-TOOLS 7.50, an unauthenticated attacker can attach to an open interface and make use of an open naming and directory API to instantiate an object which has methods which can be called without further authorization and authentication.  A subsequent call to one of these methods can read or change the state of existing services without any effect on availability.
### POC
#### Reference
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
#### Github
No PoCs found on GitHub currently.