CVE-2023-33991

8.2 HIGH

📋 TL;DR

This CVE describes a stored cross-site scripting (XSS) vulnerability in SAP UI5 Variant Management where user-controlled inputs are not properly encoded when reading data from the server. An authenticated attacker can inject malicious scripts that execute when other users view the affected content, potentially compromising their sessions, modifying data, or disrupting application availability. Affected versions include SAP_UI 750-757 and UI_700 200.

💻 Affected Systems

Products:
  • SAP UI5 Variant Management
Versions: SAP_UI 750, 754, 755, 756, 757; UI_700 200
Operating Systems: All platforms running affected SAP UI5 versions
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user-level access to exploit; affects web-based SAP applications using the vulnerable UI5 components.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with user-level access could steal administrator credentials, modify critical business data, deface the application, or cause complete application unavailability for all users.

🟠

Likely Case

An authenticated attacker steals session cookies or authentication tokens from other users, leading to account takeover and unauthorized data access or modification.

🟢

If Mitigated

With proper input validation and output encoding, the malicious scripts would be rendered harmless as text rather than executable code.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access; stored XSS payloads are relatively simple to craft and execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 3324285

Vendor Advisory: https://launchpad.support.sap.com/#/notes/3324285

Restart Required: Yes

Instructions:

1. Download and apply SAP Security Note 3324285. 2. Restart affected SAP systems. 3. Verify the patch is applied correctly.

🔧 Temporary Workarounds

Input Validation and Output Encoding

all

Implement server-side validation of all user inputs and ensure proper output encoding in the UI5 Variant Management components.

Content Security Policy (CSP)

all

Implement a strict Content Security Policy to prevent execution of unauthorized scripts.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block XSS payloads
  • Restrict user permissions to minimize attack surface and implement principle of least privilege

🔍 How to Verify

Check if Vulnerable:

Check if your SAP system is running affected UI5 versions (SAP_UI 750-757 or UI_700 200) and review SAP Security Note 3324285 status.

Check Version:

Check SAP system version through transaction code SM51 or system information reports.

Verify Fix Applied:

Verify SAP Security Note 3324285 is applied successfully and test UI5 Variant Management functionality for proper input encoding.

📡 Detection & Monitoring

Log Indicators:

  • Unusual script tags or JavaScript payloads in user input logs
  • Multiple failed login attempts followed by successful login from same IP

Network Indicators:

  • HTTP requests containing suspicious script tags or JavaScript code in parameters

SIEM Query:

source="sap_logs" AND ("<script>" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export