{"id":268,"date":"2023-04-11T09:32:00","date_gmt":"2023-04-11T06:32:00","guid":{"rendered":"https:\/\/techltx.com\/?p=268"},"modified":"2023-07-10T00:03:30","modified_gmt":"2023-07-09T21:03:30","slug":"sap-security-patch-day-april-2023","status":"publish","type":"post","link":"https:\/\/techltx.com\/de\/sap\/sap-security-patch-day-april-2023\/2023\/04\/","title":{"rendered":"SAP Security Patch Day April 2023"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p><strong>Am 11. April 2023 fand der vierte SAP Security Patchday des Jahres statt<\/strong>. Insgesamt wurden 19 neue Security Notes ver\u00f6ffentlicht, sowie f\u00fcnf Updates f\u00fcr Patchdays der vergangenen Monate. Besondere Aufmerksamkeit erforderten diesmal Schwachstellen im SAP Diagnostics Agent und in der Business Objects Promotion Management.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/techltx.com\/wp-content\/uploads\/2023\/06\/sap-security-patchday.png\"><img loading=\"lazy\" decoding=\"async\" width=\"491\" height=\"155\" src=\"https:\/\/techltx.com\/wp-content\/uploads\/2023\/06\/sap-security-patchday.png\" alt=\"SAP Security Patchday 2023-04 April\" class=\"wp-image-248\" srcset=\"https:\/\/techltx.com\/wp-content\/uploads\/2023\/06\/sap-security-patchday.png 491w, https:\/\/techltx.com\/wp-content\/uploads\/2023\/06\/sap-security-patchday-300x95.png 300w\" sizes=\"auto, (max-width: 491px) 100vw, 491px\" \/><\/a><figcaption class=\"wp-element-caption\">SAP Security Patchday <\/figcaption><\/figure>\n<\/div>\n<\/div>\n\n\n<p>Im SAP Diagnostics Agent wurden Sicherheitsl\u00fccken entdeckt, die auf praktisch allen SAP Servern installiert sind. Diese erm\u00f6glichen einem Angreifer die Ausf\u00fchrung von b\u00f6sartigen Skripten, was die Vertraulichkeit und Integrit\u00e4t des Systems gef\u00e4hrdet. Die SAP empfiehlt das Einspielen des aktuellen Patches oder das Entfernen der betroffenen Komponenten. Genauere Informationen finden sich in der Security Note 3305369.<\/p>\n<p>In der Business Objects Promotion Management besteht eine Schwachstelle, die es Angreifern mit grundlegenden Rechten erm\u00f6glicht, auf die lcmbiar-Datei zuzugreifen und somit an BI User und Passw\u00f6rter zu gelangen. Dies kann zur vollst\u00e4ndigen \u00dcbernahme der Applikation f\u00fchren. Als L\u00f6sung wird die Installation eines entsprechenden Patches empfohlen, alternativ kann ein Passwortschutz auf die Datei angewendet werden. Details dazu finden sich in der Security Note 3298961.<\/p>\n<p>Weitere HotNews-Hinweise betreffen Schwachstellen im SAP Business Client, SAP NetWeaver AS Java, SAP NetWeaver Application Server f\u00fcr ABAP und ABAP-Platform sowie SAP NetWeaver (BI CONT ADDON). Diese Schwachstellen haben unterschiedliche Auswirkungen auf die Systeme und erfordern entsprechende Ma\u00dfnahmen wie das Einspielen von Patches oder das Deaktivieren bestimmter Funktionen.<\/p>\n<p>Insgesamt wurden 24 neue und aktualisierte Sicherheitshinweise ver\u00f6ffentlicht, darunter f\u00fcnf HotNews-Hinweise und ein Hinweis mit hoher Priorit\u00e4t. Besonders erw\u00e4hnenswert ist die Zusammenarbeit mit den Onapsis Research Labs, die zur Behebung von insgesamt acht Schwachstellen beigetragen haben.<\/p>\n<p>SAP-Kunden sollten die entsprechenden Sicherheitshinweise genau pr\u00fcfen und die empfohlenen Ma\u00dfnahmen umsetzen, um ihre Systeme vor potenziellen Angriffen zu sch\u00fctzen.<\/p>\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"SAP Security Patch Day: April 2023 Highlights\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/3tQcjIPM82E?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/dam.sap.com\/mac\/app\/e\/pdf\/preview\/embed\/ucQrx6G?ltr=a&#038;rc=10\">2023-04-11: Offizielle \u00dcbersicht Offizielle SAP Security Patch Day<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news.html\">https:\/\/support.sap.com\/en\/my-support\/knowledge-base\/security-notes-news.html<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.asug.com\/insights\/business-function\/information-security\">2023-04-11: ASUG SAP Patch Day Information Session&nbsp;(f\u00fcr Mitglieder)<\/a><\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>2622660 Security updates for the browser control Google Chromium delivered with SAP Business Client<\/li>\n\n\n\n<li>3269352 [CVE-2023-29189] HTTP Verb Tampering vulnerability in SAP CRM (WebClient UI)<\/li>\n\n\n\n<li>3301457 [CVE-2023-1903] Missing Authorization check in SAP HCM Fiori App My Forms (Fiori 2.0)<\/li>\n\n\n\n<li>3275458 [CVE-2023-27499] Cross-Site Scripting (XSS) vulnerability in SAP GUI for HTML<\/li>\n\n\n\n<li>3305907 [CVE-2023-29186] Directory Traversal vulnerability in SAP NetWeaver ( BI CONT ADD ON)<\/li>\n\n\n\n<li>3312733 [CVE-2023-26458] Information Disclosure vulnerability in SAP Landscape Management<\/li>\n\n\n\n<li>3311624 [CVE-2023-29187] DLL Hijacking vulnerability in SapSetup (Software Installation Program)<\/li>\n\n\n\n<li>3117978 [CVE-2023-29111] Information Disclosure vulnerability in SAP Application Interface Framework (ODATA service)<\/li>\n\n\n\n<li>3113349 [CVE-2023-29110] Code Injection vulnerability in SAP Application Interface Framework (Message Dashboard)<\/li>\n\n\n\n<li>3115598 [CVE-2023-29109] Code Injection vulnerability in SAP Application Interface Framework (Message Dashboard)<\/li>\n\n\n\n<li>3114489 [CVE-2023-29112] Code Injection vulnerability in SAP Application Interface Framework (Message Monitoring)<\/li>\n\n\n\n<li>3298961 [CVE-2023-28765] Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Promotion Management )<\/li>\n\n\n\n<li>3309056 [CVE-2023-27897] Code Injection vulnerability in SAP CRM<\/li>\n\n\n\n<li>3316509 Remote Code Execution vulnerability in SAP Commerce<\/li>\n\n\n\n<li>3289994 [CVE-2023-28761] Missing Authentication check in SAP NetWeaver Enterprise Portal<\/li>\n\n\n\n<li>3303060 [CVE-2023-29185] Denial of Service (DOS) in SAP NetWeaver AS for ABAP (Business Server Pages)<\/li>\n\n\n\n<li>3296378 [CVE-2023-28763] &#8211; Denial of Service in SAP NetWeaver AS for ABAP and ABAP Platform<\/li>\n\n\n\n<li>3305369 [CVE-2023-27497] Multiple vulnerabilities in SAP Diagnostics Agent (OSCommand Bridge and EventLogServiceCollector)<\/li>\n\n\n\n<li>3287784 [CVE-2023-24527] Improper Access Control in SAP NetWeaver AS Java for Deploy Service<\/li>\n\n\n\n<li>3315312 [CVE-2023-29108] IP filter vulnerability in ABAP Platform and SAP Web Dispatcher<\/li>\n\n\n\n<li>3294595 [CVE-2023-27269] Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>SAP Security Notes Patchday April 2023 Dieser Artikel ist eine Zusammenfassung \u00fcber die Inhalte und aktuellen Schwachstellen f\u00fcr SAP Systeme. Insbesondere SAP Diagnostic Agent und Business Objects, ODATA, SAPGUI, Authorization<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_uag_custom_page_level_css":"","site-sidebar-layout":"right-sidebar","site-content-layout":"boxed-container","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[5,11],"tags":[23,18,22,21,7,20],"class_list":["post-268","post","type-post","status-publish","format-standard","hentry","category-sap","category-sap-security-patch-day","tag-authorization","tag-businessobjects","tag-codeinjection","tag-dos","tag-sap","tag-smdagent"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"BALTX","author_link":"https:\/\/techltx.com\/de\/author\/baltx-com\/"},"uagb_comment_info":0,"uagb_excerpt":"SAP Security Notes Patchday April 2023 Dieser Artikel ist eine Zusammenfassung \u00fcber die Inhalte und aktuellen Schwachstellen f\u00fcr SAP Systeme. Insbesondere SAP Diagnostic Agent und Business Objects, ODATA, SAPGUI, Authorization","_links":{"self":[{"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/posts\/268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/comments?post=268"}],"version-history":[{"count":4,"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/posts\/268\/revisions"}],"predecessor-version":[{"id":472,"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/posts\/268\/revisions\/472"}],"wp:attachment":[{"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/media?parent=268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/categories?post=268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techltx.com\/de\/wp-json\/wp\/v2\/tags?post=268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}