SAP NetWeaver BI CONT Add-on Directory Traversal -> Overwrite OS Files
CVE-2023-33989 Published on July 11, 2023
Directory Traversal vulnerability in SAP NetWeaver (BI CONT ADD ON)
An attacker with non-administrative authorizations in SAP NetWeaver (BI CONT ADD ON) - versions 707, 737, 747, 757, can exploit a directory traversal flaw to over-write system files. Data from confidential files cannot be read but potentially some OS files can be over-written leading to system compromise.
Vulnerability Analysis
CVE-2023-33989 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, a high impact on integrity and availability.
Weakness Type
What is a Directory traversal Vulnerability?
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CVE-2023-33989 has been classified to as a Directory traversal vulnerability or weakness.
Products Associated with CVE-2023-33989
stack.watch emails you whenever new vulnerabilities are published in SAP Netweaver Bi Content or SAP NetWeaver. Just hit a watch button to start following.
Affected Versions
SAP_SE SAP NetWeaver (BI CONT ADD ON):- Version 707 is affected.
- Version 737 is affected.
- Version 747 is affected.
- Version 757 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.