Rewterz Threat Advisory – Shuckworm APT Group aka Armageddon’s Phishing Campaign To Target Security Services Of Ukraine – Active IOCs
December 15, 2022Rewterz Threat Advisory – CVE-2022-41273 – SAP Sourcing and Contract Lifecycle Management Vulnerability
December 15, 2022Rewterz Threat Advisory – Shuckworm APT Group aka Armageddon’s Phishing Campaign To Target Security Services Of Ukraine – Active IOCs
December 15, 2022Rewterz Threat Advisory – CVE-2022-41273 – SAP Sourcing and Contract Lifecycle Management Vulnerability
December 15, 2022Severity
High
Analysis Summary
CVE-2022-41272 CVSS:9.9
SAP NetWeaver Process Integration could allow a remote attacker to bypass security restrictions, caused by improper access control. By sending a specially-crafted request, an attacker could exploit this vulnerability to gain full read access to user data, make limited modifications to user data, and degrade the performance of the system.
CVE-2022-41262 CVSS:6.1
SAP NetWeaver AS for Java is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim’s Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
Impact
Security Bypass
Cross-Site Scripting
Indicators Of Compromise
CVE
- CVE-2022-41272
- CVE-2022-41262
Affected Vendors
SAP
Affected Products
- SAP NetWeaver Process Integration 7.50
- SAP NetWeaver AS for JAVA 7.50
Remediation
Current SAP customers should refer to SAP note for patch information, available from the SAP Web site (login required).