cve/2023/CVE-2023-25614.md

19 lines
1.1 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-25614](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25614)
![](https://img.shields.io/static/v1?label=Product&message=NetWeaver%20AS%20ABAP%20(BSP%20Framework)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20700%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%3A%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brighgreen)
### Description
SAP NetWeaver AS ABAP (BSP Framework) application - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, allow an unauthenticated attacker to inject the code that can be executed by the application over the network. On successful exploitation it can gain access to the sensitive information which leads to a limited impact on the confidentiality and the integrity of the application.
### POC
#### Reference
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
2024-06-09 00:33:16 +00:00
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.