CVE-2023-27501
Published Mar 14, 2023
Last updated 2 years ago
Overview
- Description
- SAP NetWeaver AS for ABAP and ABAP Platform - versions 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791, allows an attacker to exploit insufficient validation of path information provided by users, thus exploiting a directory traversal flaw in an available service to delete system files. In this attack, no data can be read but potentially critical OS files can be deleted making the system unavailable, causing significant impact on both availability and integrity
- Source
- cna@sap.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.6
- Impact score
- 5.8
- Exploitability score
- 3.1
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- cna@sap.com
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:700:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5A3C915-0E5F-4B1A-B1EB-5ADEA517F620" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:701:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "98B2522A-B850-4EC2-B2F2-5EBF36801B39" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:702:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "706FEB9E-3EE9-405E-A8C9-733DAF68AC6D" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CC29738-CF17-4E6B-9C9E-879B17F7E001" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "127E508F-6CC1-41C8-96DF-8D14FFDD4020" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7777AA80-1608-420E-B7D5-09ABECD51728" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0539618A-1C4D-463F-B2BB-DD1C239C23EB" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:752:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "62828DCD-F80E-4C7C-A988-EFEA06A5223E" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9F38585-73AE-4DBB-A978-F0272DF8FB58" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D416C064-BB8A-4230-A761-84A93E017F79" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B8D3EA0-28E6-4333-8C67-B9D3775EB9BC" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:756:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "72491771-4492-4902-9F0C-CE6A60BAA705" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:757:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "421A5354-F764-402B-A3A4-2D746EACEB46" }, { "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:791:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "312DBCA5-D3F6-4F42-B632-34759D799856" } ], "operator": "OR" } ] } ]