cve/2023/CVE-2023-0014.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-0014](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0014)
![](https://img.shields.io/static/v1?label=Product&message=NetWeaver%20ABAP%20Server%20and%20ABAP%20Platform&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20SAP_BASIS%20701%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-294%20Authentication%20Bypass%20by%20Capture-replay&color=brighgreen)
### Description
SAP NetWeaver ABAP Server and ABAP Platform - versions SAP_BASIS 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, KERNEL 7.22, 7.53, 7.77, 7.81, 7.85, 7.89, KRNL64UC 7.22, 7.22EXT, 7.53, KRNL64NUC 7.22, 7.22EXT, creates information about system identity in an ambiguous format. This could lead to capture-replay vulnerability and may be exploited by malicious users to obtain illegitimate access to the system.
### POC
#### Reference
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
#### Github
No PoCs found on GitHub currently.