CVE-2023-33993

7.1 HIGH

📋 TL;DR

This SQL injection vulnerability in SAP Business One's B1i module allows authenticated users with deep knowledge to craft malicious queries that can read or modify SQL data. Successful exploitation can compromise data confidentiality, integrity, and application availability. The vulnerability affects SAP Business One version 10.0.

💻 Affected Systems

Products:
  • SAP Business One
Versions: 10.0
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the B1i module; exploitation requires deep knowledge of the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise allowing data theft, modification, or deletion, potentially leading to business disruption and data loss.

🟠

Likely Case

Unauthorized data access and modification by authenticated malicious insiders or attackers who have compromised legitimate credentials.

🟢

If Mitigated

Limited impact with proper input validation, parameterized queries, and least privilege database access controls in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authentication and deep knowledge of the system, making it more likely to be exploited by insiders or sophisticated attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Note 3337797

Vendor Advisory: https://me.sap.com/notes/3337797

Restart Required: Yes

Instructions:

1. Download and apply SAP Note 3337797 from the SAP Support Portal. 2. Restart the SAP Business One application and related services. 3. Verify the patch is applied by checking the version and testing for the vulnerability.

🔧 Temporary Workarounds

Implement Input Validation

all

Add server-side input validation to reject malicious SQL queries in the B1i module.

Restrict Database Permissions

all

Apply principle of least privilege to database accounts used by the B1i module.

🧯 If You Can't Patch

  • Implement network segmentation to isolate SAP Business One systems from untrusted networks.
  • Enhance monitoring and logging of database queries from the B1i module for suspicious activity.

🔍 How to Verify

Check if Vulnerable:

Check if SAP Business One version 10.0 is installed and if SAP Note 3337797 has not been applied.

Check Version:

Check SAP Business One version through the application interface or consult system documentation.

Verify Fix Applied:

Verify that SAP Note 3337797 is applied and test the B1i module with SQL injection test cases to ensure they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs from the B1i module
  • Multiple failed or complex queries from single authenticated sessions

Network Indicators:

  • Unusual network traffic patterns to the database from SAP Business One servers
  • SQL error messages in network traffic

SIEM Query:

source="database_logs" AND (query CONTAINS "UNION" OR query CONTAINS "SELECT *" OR query CONTAINS "DROP") AND source_ip="SAP_B1_server"

🔗 References

📤 Share & Export