Learn about CVE-2023-33989, a high severity directory traversal vulnerability in SAP NetWeaver (BI CONT ADD ON) versions 707, 737, 747, and 757, allowing attackers to overwrite system files.
A directory traversal vulnerability has been identified in SAP NetWeaver (BI CONT ADD ON) versions 707, 737, 747, and 757, allowing attackers with non-administrative authorizations to overwrite system files, potentially leading to system compromise.
Understanding CVE-2023-33989
This section delves into the details of CVE-2023-33989.
What is CVE-2023-33989?
An attacker with non-administrative authorizations in SAP NetWeaver (BI CONT ADD ON) - versions 707, 737, 747, 757, can exploit a directory traversal flaw to overwrite system files. Data from confidential files cannot be read but potentially some OS files can be overwritten leading to system compromise.
The Impact of CVE-2023-33989
The vulnerability poses a high risk with a base severity score of 8.7, allowing attackers to compromise system integrity and cause high availability impact. Confidentiality impact is rated as none.
Technical Details of CVE-2023-33989
This section provides in-depth technical information about CVE-2023-33989.
Vulnerability Description
The flaw in SAP NetWeaver (BI CONT ADD ON) versions 707, 737, 747, 757 enables attackers to perform directory traversal attacks, overwriting system files.
Affected Systems and Versions
Versions 707, 737, 747, and 757 of SAP NetWeaver (BI CONT ADD ON) are affected by this vulnerability.
Exploitation Mechanism
Attackers with non-administrative authorizations exploit the directory traversal flaw to compromise the system.
Mitigation and Prevention
This section outlines the steps to mitigate and prevent exploitation of CVE-2023-33989.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security patches released by SAP and apply them promptly to protect systems.