cve/2023/CVE-2023-27897.md

18 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-27897](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27897)
![](https://img.shields.io/static/v1?label=Product&message=CRM&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20700%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%3A%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen)
### Description
In SAP CRM - versions 700, 701, 702, 712, 713, an attacker who is authenticated with a non-administrative role and a common remote execution authorization can use a vulnerable interface to execute an application function to perform actions which they would not normally be permitted to perform. Depending on the function executed, the attack can can have limited impact on confidentiality and integrity of non-critical user or application data and application availability.
### POC
#### Reference
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
#### Github
No PoCs found on GitHub currently.