CVE-2023-27500

9.6 CRITICAL

📋 TL;DR

This vulnerability allows authenticated non-administrative users to exploit a directory traversal flaw in SAPRSBRO program to overwrite critical system files. This can lead to denial of service by making the operating system unavailable. Affects SAP systems with vulnerable versions of SAPRSBRO.

💻 Affected Systems

Products:
  • SAP NetWeaver Application Server ABAP
  • SAP NetWeaver Application Server Java
Versions: SAP_BASIS 700-754, SAP_BASIS 755-758, SAP_BASIS 800-802
Operating Systems: All supported OS platforms for SAP NetWeaver
Default Config Vulnerable: ⚠️ Yes
Notes: Requires SAPRSBRO program access with non-administrative authorizations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system unavailability through overwriting of critical OS files, requiring system restoration from backups.

🟠

Likely Case

Targeted DoS attacks against specific SAP systems by overwriting configuration or system files.

🟢

If Mitigated

Limited impact with proper access controls and file system permissions in place.

🌐 Internet-Facing: MEDIUM - Requires authenticated access but could be exploited if SAP interfaces are exposed.
🏢 Internal Only: HIGH - Internal users with non-admin SAP access can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but directory traversal is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3302162

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3302162

Restart Required: Yes

Instructions:

1. Download SAP Note 3302162 from SAP Support Portal. 2. Apply the correction instructions provided in the note. 3. Restart affected SAP instances.

🔧 Temporary Workarounds

Restrict SAPRSBRO access

all

Limit access to SAPRSBRO program to only authorized administrative users.

SAP transaction PFCG to modify authorization profiles

File system permissions hardening

linux

Implement strict file system permissions to prevent overwriting of critical OS files.

chmod 644 /path/to/critical/files
chown root:root /path/to/critical/files

🧯 If You Can't Patch

  • Implement strict access controls to limit SAPRSBRO program access to essential users only.
  • Monitor file system changes and implement file integrity monitoring for critical OS files.

🔍 How to Verify

Check if Vulnerable:

Check if SAP Security Note 3302162 is applied using SAP Note Assistant or transaction SNOTE.

Check Version:

Execute 'disp+work' in SAP GUI or check SAP_BASIS version in system information.

Verify Fix Applied:

Verify SAP Note 3302162 implementation status and test SAPRSBRO functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SAPRSBRO program executions
  • File modification attempts on system directories

Network Indicators:

  • SAP GUI or RFC connections to SAPRSBRO from non-admin users

SIEM Query:

source="sap_audit_log" AND program="SAPRSBRO" AND user!="*ADMIN*"

🔗 References

📤 Share & Export