SAP Patch Day: February 2023

SAP Security Notes Blog

High Priority Notes for SAP Host Agent, SAP BusinessObjects, and SAP Business Planning and Consolidation

Highlights of February SAP Security Notes analysis include:

  • February Summary—Twenty-six new and updated SAP security patches released, including one HotNews Note and five High Priority Notes
  • Highest CVSS score for SAP Host Agent—Critical vulnerability allows executing arbitrary OS commands
  • Onapsis Research Labs Contribution—Our team supported SAP in patching thirteen vulnerabilities, covered by twelve SAP Security Notes

SAP has released twenty-six SAP Security Notes on its February Patch Day, including one HotNews Note and five High Priority Notes.

The only HotNews Note in February is the periodically recurring SAP Security Note #2622660 which patches the latest Chromium vulnerabilities for SAP Business Client. It patches fifty-four Chromium vulnerabilities, including twenty-two High Priority patches. The maximum CVSS score of all fixed vulnerabilities is 8.8.

Two of the five High Priority Notes are updated versions of previously released SAP Security Notes and were initially released on SAP’s December Patch Day.

SAP Security Note #3268172, tagged with a CVSS score of 8.8, now explicitly mentions that customers running SAP on another database other than HANA are also affected by this note.

High Priority Note #3271091, tagged with a CVSS score of 8.5, patches a Privilege Escalation vulnerability in SAP Business Planning and Consolidation. This note was only updated with some minor text changes, it doesn’t require any new customer activity if it is already implemented.

The New High Priority Notes in Detail

The most critical patch of SAP’s February Patch Day with regard to CVSS score is SAP Security Note #3285757, tagged with a CVSS score of 8.8. Our team from the Onapsis Research Labs (ORL) detected a serious vulnerability in SAP Host Agent. An authenticated non-admin user with local access to a server port assigned to the SAP Host Agent Service can submit a specially crafted web service request with an arbitrary operating system command. This command is executed with administrator privileges and can impact a system’s confidentiality, integrity, and availability. The note provides a patch for SAP Host Agent. Customers not familiar with upgrading SAP Host Agent can refer to SAP Note #1031096 for details.

The two remaining new High Priority Notes both affect SAP BusinessObjects (BO) customers.

SAP Security Note #3263135, tagged with a CVSS score of 8.5, patches an Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence platform. The note does not provide any more details except that an attacker requires authentication for an attack. A successful exploit can lead to a high impact on confidentiality and a limited impact on the integrity of the application.

The more critical note, in terms of its possible impact on the application, is SAP Security Note #3256787, tagged with a CVSS score of 8.4. The patched vulnerability allows an authenticated admin user to upload malicious code that can be executed by the application over the network. Although the impact on the application’s confidentiality, integrity, and availability is High, the CVSS score is lower than SAP Security Note #3263135 since an attacker requires a user with admin privileges for a successful exploit.

Contribution of the Onapsis Research Labs

In addition to the critical vulnerability in SAP Host Agent that was patched with SAP Security Note #3285757, the Onapsis Research Labs (ORL) supported SAP in patching nine Cross-Site Scripting vulnerabilities and three URL Redirection vulnerabilities. They affect the following applications:

  • SAP NetWeaver AS for ABAP and ABAP Platform
  • SAP NetWeaver AS ABAP Business Server Pages(Framework & Application)
  • SAP Solution Manager
  • SAP Solution Manager (BSP Application)

The patched software components are:

  • SAP_BASIS
  • SAP_ABA
  • ST

The CVSS score of the corresponding vulnerabilities range between 6.1 and 6.5. The following list provides a brief list of versions and Support Package(SP) Levels of the components require patching. However, thorough investigation of customer versions and Support packages should be performed to ensure accuracy:

SAP Note

Component

Vulnerability

CVSS

Release

Affected SP

3270509

ST

URL Redirection

6,5

720

08-16

3266751

ST

Cross-Site Scripting

6,1

720

08-16

3265846

ST

Cross-Site Scripting

6,5

720

08-16

3267442

ST

Cross-Site Scripting

6,5

720

08-16

3268959

SAP BASIS

Cross-Site Scripting

URL Redirection

6.1

740

750

751

752

753

754

755

756

757

09-28

00-25

00-15

00-11

00-09

00-07

00-05

00-03

00-01

3271227

SAP BASIS

URL Redirection

6.1

700

701

702

731

740

750

751

752

753

754

755

756

757

04-40

08-25

02-25

01-32

00-29

00-25

00-15

00-11

00-09

00-07

00-05

00-03

00-01

3293786

SAP BASIS

Cross-Site Scripting

6,1

740

750

751

752

753

754

755

756

757

07-29

00-26

00-16

00-11

00-09

00-07

00-05

00-03

00-01

3274585

SAP BASIS

Cross-Site Scripting

6,1

700

701

702

731

740

750

751

752

753

754

755

756

757

36-40

22-25

22-25

28-32

25-29

20-25

12-15

08-11

05-09

03-07

01-05

01-03

00-01

3269118

SAP BASIS

Cross-Site Scripting

6,1

700

701

702

731

740

39-40

24-25

24-25

28-32

25-28

3269151

SAP BASIS

Cross-Site Scripting

6,1

700

701

702

731

740

750

751

752

753

754

755

756

757

39-40

24-25

24-25

28-32

25-28

20-25

12-15

08-11

06-09

04-07

01-05

01-03

00-01

3282663

SAP ABA

Cross-Site Scripting

6,1

700

701

702

731

740

750

751

752

75C

75D

75E

75F

75G

75H

07-40

00-25

01-25

01-32

00-29

00-26

00-15

00-11

00-11

00-09

00-07

00-05

00-03

00-01

Summary & Conclusions

SAP’s February Patch Day comes with more than double the number compared to last Patch Day. However, with the periodically recurring SAP Security Note #2622660 for SAP Business Client as the only HotNews Note, one High Priority Note for SAP Host Agent, and two High Priority Note for SAP BusinessObjects, it can be considered a less critical SAP Patch Day. Nevertheless, with its large amount of Medium Priority Notes of which the ORL team contributed to the majority, SAP Admins will be busy again this month.

SAP Note

Type

Description

Priority

CVSS

2622660

Update

Security updates for the browser control Google Chromium delivered with SAP Business Client

BC-FES-BUS-DSKK

HotNews

10,0

3271091

Update

[CVE-2022-41268] Privilege escalation vulnerability in SAP Business Planning and Consolidation

EPM-BPC-NW

High

8,5

3256787

New

[CVE-2023-24530] Unrestricted Upload of File in SAP BusinessObjects Business Intelligence Platform (CMC)

BI-BIP-CMC

High

8,4

3287291

New

[CVE-2023-23854] Missing Authorization check in SAP NetWeaver AS ABAP and ABAP Platform

BC-DWB-TOO-ABA

Low

3,8

3285757

New

[CVE-2023-24523] Privilege Escalation vulnerability in SAP Host Agent (Start Service)

BC-CCM-HAG

High

8,8

2788178

New

[CVE-2023-24525] Cross-Site Scripting (XSS) vulnerability in SAP CRM WebClient UI

CA-WUI-UI-TAG

Medium

4,3

2985905

New

[CVE-2023-24524] Missing Authorization check in SAP S/4 HANA Map Treasury Correspondence Format Data

CA-GTF-CSC-DME

Medium

6,5

3275841

New

[CVE-2023-23851] Unrestricted File Upload in SAP Business Planning and Consolidation

EPM-BPC-NW-INF

Medium

5,4

3293786

New

[CVE-2023-23858] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform

BC-ABA-LA

Medium

6,1

3281724

New

[CVE-2023-0019] Missing Authorization check in SAP GRC (Process Control)

GRC-SPC-AC

Medium

6,5

3290901

New

[CVE-2023-24528] Missing Authorization Check in SAP Fiori apps for Travel Management in SAP ERP (My Travel Requests)

FI-TV-ODT-MTR

Medium

6,5

3282663

New

[CVE-2023-24529] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (Business Server Pages application)

CA-GTF-PCF

 

Medium

6,1

3274585

New

[CVE-2023-25614] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework)

BC-BSP

Medium

6,1

3269118

New

[CVE-2023-24522] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework)

BC-BSP

Medium

6,1

3269151

New

[CVE-2023-24521] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework)

BC-BSP

Medium

6,1

3271227

New

[CVE-2023-23853] URL Redirection vulnerability in SAP NetWeaver Application Server for ABAP and ABAP Platform

BC-MID-ICF

Medium

6,1

3268959

New

[Multiple CVEs] Multiple vulnerabilities in SAP NetWeaver AS for ABAP and ABAP Platform

BC-MID-AC

Medium

6,1

3266751

New

[CVE-2023-23852] Cross-Site Scripting (XSS) vulnerability in SAP Solution Manager 7.2

SV-SMG-MON-SYS

Medium

6,1

3265846

New

[CVE-2023-0024] Cross Site Scripting in SAP Solution Manager (BSP Application)

SV-SMG-SVD-SWB

Medium

6,5

3267442

New

[CVE-2023-0025] Cross Site Scripting in SAP Solution Manager (BSP Application)

SV-SMG-SVD-SWB

Medium

6,5

3270509

New

[CVE-2023-23855] URL Redirection vulnerability in SAP Solution Manager

SV-SMG-OP

Medium

6,5

3263135

New

[CVE-2023-0020] Information disclosure vulnerability in SAP BusinessObjects Business Intelligence platform

BI-BIP-INV

High

8,5

3263863

New

[CVE-2023-23856] Cross-Site Scripting (XSS) vulnerability in Web Intelligence Interface

BI-RA-WBI-FE

Medium

4,3

3262544

Update

[CVE-2022-41262] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS for Java (Http Provider Service)

BC-JAS-WEB

Medium

6,1

3268172

Update

[CVE-2022-41264] Code Injection vulnerability in SAP BASIS

BC-DB-HDB-POR

High

8,8

3283283

Update

[CVE-2023-0013] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform

BC-ABA-LA

Medium

6,1

As always, the Onapsis Research Labs is already updating The Onapsis Platform to incorporate the newly published vulnerabilities into the product so that our customers can protect their businesses.

For more information about the latest SAP security issues and our continuous efforts to share knowledge with the security community, subscribe to our monthly Defender’s Digest Onapsis Newsletter.