{"id":9224,"date":"2023-07-12T10:07:41","date_gmt":"2023-07-12T08:07:41","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=9224"},"modified":"2023-12-28T11:37:39","modified_gmt":"2023-12-28T09:37:39","slug":"sap-security-notes-july-2023","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/","title":{"rendered":"SAP Security Notes, July 2023"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<h2>July 2023 notes<\/h2>\n<h3>Summary and highlights of the month<\/h3>\n<p>The total number of notes\/patches was 18, 5 more than last month. The number of Hot News increased from 0 to 2 this month. On the other hand, it is worth noting that the number of high criticality notes increases, going from 4 to 7. As usual we will leave the medium and low notes unreviewed this month, but <strong>we will give details of a total of 9 notes<\/strong> (all those with a CVSS of <span style=\"color: #c2c200;\">7<\/span> or higher).<\/p>\n<p>We have <strong>a total of 18 notes <\/strong>for the whole month (the 18 from patch Tuesday, 16 new ones and 2 updates, that&#8217;s 5 more scores than last patch Tuesday).<\/p>\n<p>We will review in detail 9 of the total 9 high notes and HotNews, 1 of the 2 HotNews is new and 6 of 7 high notes would be new (those of CVSS greater than or equal to <span style=\"color: #c2c200;\">7<\/span>).<\/p>\n<ol>\n<li><strong>The most critical note of the month (with CVSS <span style=\"color: #ff0000;\">10<\/span>)<\/strong> is an update of the usual note related to &#8220;Google Chromium&#8221;.<\/li>\n<li>The next most critical note<strong> (with CVSS <span style=\"color: #ff0000;\">9.1<\/span>)<\/strong> is a HotNew related to &#8220;<strong>OS command injection vulnerability in SAP ECC and SAP S\/4HANA<\/strong>&#8220;.<\/li>\n<li>The next criticality score (with<strong> CVSS <span style=\"color: #ff0000;\">8.7<\/span><\/strong>) is related to &#8220;<strong>Directory Traversal vulnerability in SAP NetWeaver (BI CONT ADD ON)<\/strong>&#8220;.<\/li>\n<li>The following note in criticality (with <strong>CVSS <span style=\"color: #ff0000;\">8,6<\/span><\/strong>), &#8220;<strong>Request smuggling and request concatenation vulnerability in SAP Web Dispatcher<\/strong>&#8220;.<\/li>\n<li>The following criticality note (with <strong>CVSS <span style=\"color: #ff0000;\">8.2<\/span><\/strong>), is an update of a note published last June, related to &#8220;<strong>Stored Cross-Site Scripting vulnerability in SAP UI5 (Variant Management)<\/strong>&#8220;.<\/li>\n<li>The following criticality scores (with <strong>CVSS <span style=\"color: #c2c200;\">7.8<\/span> and <span style=\"color: #c2c200;\">7.7<\/span><\/strong>) are two high scores, one related to &#8220;<strong>Denial of service (DOS) vulnerability in SAP SQL Anywhere<\/strong>&#8221; and the other to &#8220;<strong>Memory Corruption vulnerability in SAP Web Dispatcher<\/strong>&#8220;.<\/li>\n<li>The following criticality scores (with <strong>CVSS <span style=\"color: #c2c200;\">7.2<\/span><\/strong>), are two high scores, one related to &#8220;<strong>Unauthenticated blind SSRF in SAP Solution Manager (Diagnostics agent) and the other to &#8220;Header Injection in SAP Solution Manager (Diagnostic Agent)<\/strong>&#8220;.<\/li>\n<li>This month the most predominant type is &#8220;<strong>Injection vulnerability<\/strong>&#8221; (3\/18 in patch day).<\/li>\n<\/ol>\n<p>In the graph (post July 2023 from SAP) we can see the <span style=\"text-decoration: underline;\"><strong>ranking of the July notes<\/strong><\/span> in addition to the evolution and ranking of the last 5 previous months (only the notes of Sec. Tuesday \/ Patch Day &#8211; by SAP):<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-9226\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/notas-sap-julio-2023.jpg\" alt=\"\" width=\"702\" height=\"369\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/notas-sap-julio-2023.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/notas-sap-julio-2023-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/notas-sap-julio-2023-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/notas-sap-julio-2023-600x315.jpg 600w\" sizes=\"(max-width: 702px) 100vw, 702px\" \/><\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ul>\n<li><strong><u>Update &#8211; Security updates for the browser control Google Chromium delivered with SAP Business Client (2622660):<\/u><\/strong> This security note addresses multiple vulnerabilities in the 3rd party web browser control Chromium, which can be used within SAP Business Client. This note will be modified periodically based on web browser updates by the open-source project Chromium. The note priority is based on the highest CVSS score of all the vulnerabilities fixed in the latest browser release. If the SAP Business Client release is not updated to the latest patch level, displaying web pages in SAP Business Client via this open-source browser control might lead to different vulnerabilities like memory corruption, Information Disclosure and the like. The solution will be to update the SAP Business Client patch to the newest one, which contains the most current stable major release of the Chromium browser control, which passed the SAP internal quality measurements of SAP Business Client. The note has been re-released with updated \u2018Solution\u2019 and \u2018Support Packages &amp; Patches\u2019 information. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>10<\/strong><\/span><strong> \/ 10 (Multiple CVE\u00b4s).<\/strong><\/li>\n<li><strong><u>OS command injection vulnerability in SAP ECC and SAP S\/4HANA (IS-OIL) (3350297): <\/u><\/strong>Due to programming error in function module and report, IS-OIL component in SAP ECC and SAP S\/4HANA allows an authenticated attacker to inject an arbitrary operating system command into an unprotected parameter in a common (default) extension.\u00a0 On successful exploitation, the attacker can read or modify the system data as well as shut down the system.<strong> CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>9,1<\/strong><\/span><strong> \/ 10 [CVE-2023-36922].<\/strong><\/li>\n<li><strong><u>Directory Traversal vulnerability in SAP NetWeaver (BI CONT ADD ON) (3331376<\/u><\/strong><strong>): <\/strong>An attacker with non-administrative authorizations can exploit a directory traversal flaw to over-write system files. Data from confidential files cannot be read but potentially some OS files can be over-written leading to system compromise.<strong> CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>8,7<\/strong><\/span><strong> \/ 10 [CVE-2023-33989].<\/strong><\/li>\n<li><strong><u>Request smuggling and request concatenation vulnerability in SAP Web Dispatcher (3233899)<\/u><\/strong><u>: <\/u>This note has two attack scenarios:<\/li>\n<\/ul>\n<p style=\"padding-left: 80px;\"><strong><u>Scenario 1: CVSS Score: <\/u><\/strong><span style=\"color: #ff0000;\"><strong>8,6<\/strong><\/span><strong>\/10: <\/strong>In SAP NetWeaver AS ABAP and SAP Web Dispatcher an unauthenticated attacker can submit a maliciously crafted request over a network to a front-end server which may, over a number of attempts, result in a back-end server confusing the boundaries of malicious and legitimate messages resulting in execution of malicious payloads which can be used to make it temporarily unavailable, leading to considerable impact on availability.<\/p>\n<p style=\"padding-left: 80px;\"><strong><u>Scenario 2: CVSS Score: <\/u><\/strong><span style=\"color: #ff0000;\"><strong>8,1<\/strong><\/span><strong>\/10: <\/strong>In SAP NetWeaver AS ABAP and SAP Web Dispatcher an unauthenticated attacker can submit a maliciously crafted request over a network to a front-end server which may, over non-predictive number of attempts, result in a back-end server confusing the boundaries of malicious and legitimate messages resulting in execution of malicious payloads which can be used to read or modify information on the server or make it temporarily unavailable, leading to a limited impact on confidentiality and availability but considerable impact on availability.<\/p>\n<p style=\"padding-left: 80px;\"><strong>CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>8,6<\/strong><\/span><strong> \/ 10 [CVE-2023-33987].<\/strong><\/p>\n<ul>\n<li><strong><u>Update &#8211; Stored Cross-Site Scripting (Stored XSS) vulnerability in UI5 Variant Management (3324285<\/u><\/strong><strong>):<\/strong> UI5 Variant Management does not sufficiently encode user-controlled inputs on reading data from the server, resulting in Stored Cross-Site Scripting (Stored XSS) vulnerability. After successful exploitation, an attacker with user level access can cause high impact on confidentiality, modify some information and also can cause unavailability of the application at user level. This note requires manual activities for implementation. This note has been re-released with updated &#8216;Solution&#8217; information <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>8,2<\/strong><\/span><strong> \/ 10 [CVE-2023-33991].<\/strong><\/li>\n<li><strong><u>Denial of service (DOS) vulnerability in SAP SQL Anywhere (3331029):<\/u><\/strong> SAP SQL Anywhere allows an attacker to prevent legitimate users from accessing the service by crashing the service. An attacker with low privileged account and access to the local system can write into the shared memory objects. This can be leveraged by an attacker to perform a Denial of Service. Further, an attacker might be able to modify sensitive data in shared memory objects. <strong>CVSS v3 Base Score: <\/strong><strong><span style=\"color: #cfcf00;\">7,8<\/span> <\/strong><strong>\/ 10 [CVE-2023-33990].<\/strong><\/li>\n<li><strong><u>Memory Corruption vulnerability in SAP Web Dispatcher (3340735<\/u><\/strong><u>)<\/u>: The SAP Web Dispatcher has a vulnerability that can be exploited by an unauthenticated attacker to cause memory corruption through logical errors in memory management this may leads to information disclosure or system crashes, which can have low impact on confidentiality and high impact on the integrity and availability of the system. The issue affects the standalone SAP Web Dispatcher, the SAP Web Dispatcher integrated in the ASCS instance, the Internet Communication Manager (ICM) in SAP NetWeaver Application Server ABAP and the Web Dispatcher integrated in SAP HANA. The vulnerability affects only the HTTP\/2 protocol. <strong>CVSS v3 Base Score: <\/strong><strong><span style=\"color: #cfcf00;\">7,7<\/span> <\/strong><strong>\/ 10 [CVE-2023-35871].<\/strong><\/li>\n<li><strong><u>Unauthenticated blind SSRF in SAP Solution Manager (Diagnostics agent) (3352058): <\/u><\/strong>SAP Solution Manager (Diagnostics agent) allows an unauthenticated attacker to blindly execute HTTP requests. On successful exploitation, the attacker can cause a limited impact on confidentiality and availability of the application and other applications the Diagnostics Agent can reach.. <strong>CVSS v3 Base Score: <\/strong> <strong><span style=\"color: #cfcf00;\">7,2<\/span> <\/strong><strong>\/ 10 [CVE-2023-36925].<\/strong><\/li>\n<li><strong><u>Header Injection in SAP Solution Manager (Diagnostic Agent) (3348145): <\/u><\/strong>SAP Solution Manager(Diagnostics agent) allows an attacker to tamper with headers in a client request. This misleads SAP Diagnostics Agent to serve poisoned content to the server. On successful exploitation, the attacker can cause a limited impact on confidentiality and availability of the application. <strong> CVSS v3 Base Score: <\/strong><strong><span style=\"color: #cfcf00;\">7,2<\/span> <\/strong><strong>\/ 10 [CVE-2023-36921].<\/strong><\/li>\n<\/ul>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (July):<\/p>\n<p><a href=\"https:\/\/ddec1-0-en-ctp.trendmicro.com:443\/wis\/clicktime\/v1\/query?url=https%3a%2f%2fdam.sap.com%2fmac%2fapp%2fe%2fpdf%2fpreview%2fembed%2fucQrx6G%3fltr%3da%26rc%3d10&amp;umid=8780927f-e301-4dbb-b956-0ee07e663535&amp;auth=708978c2440d0c6de95dfde6471e502ec413f9a9-7b931f29de852470f9891be8f0e84f4998e8e703\">Digital Library (sap.com)<\/a><\/p>\n<p><a href=\"https:\/\/onapsis.com\/blog\/sap-security-patch-day-july-2023\">SAP Security Patch Day: July 2023 | Onapsis<\/a><\/p>\n<h3 style=\"font-weight: 400;\"><strong><u>Resources affected<\/u><\/strong><\/h3>\n<div class=\"w-post-elm post_content\">\n<ul>\n<li>SAP Business Client, Versions -6.5, 7.0, 7.70<\/li>\n<li>SAP ECC and SAP S\/4HANA (IS-OIL), Versions -600, 602, 603, 604, 605, 606, 617, 618, 800, 802, 803, 804, 805, 806, 807<\/li>\n<li>SAP NetWeaver (BI CONT ADD ON), Versions \u2013707, 737, 747, 757<\/li>\n<li>SAP Solution Manager (Diagnostic Agent), Versions \u20137.20<\/li>\n<li>SAP SQL Anywhere, Version-17.0<\/li>\n<li>SAP UI5 Variant Management, Versions \u2013SAP_UI 750, SAP_UI 754, SAP_UI 755, SAP_UI 756, SAP_UI 757, UI_700 200<\/li>\n<li>SAP Web Dispatcher, Versions-WEBDISP 7.53, WEBDISP 7.54, WEBDISP 7.77, WEBDISP 7.85, WEBDISP7.89, WEBDISP 7.91, WEBDISP 7.92, WEBDISP 7.93, KERNEL 7.53, KERNEL 7.54,KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KRNL64UC 7.53, HDB 2.00, XS_ADVANCED_RUNTIME 1.00, SAP_EXTENDED_APP_SERVICES 1<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. July 2023 notes Summary and highlights of the month The total number of notes\/patches was 18, 5 more than last month. The number of Hot News increased from 0 to 2 this month&#8230;.<\/p>\n","protected":false},"author":6,"featured_media":9226,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[],"class_list":["post-9224","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, July 2023 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from July 2023, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, July 2023\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from July 2023, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-12T08:07:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-28T09:37:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/notas-sap-julio-2023.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, July 2023\",\"datePublished\":\"2023-07-12T08:07:41+00:00\",\"dateModified\":\"2023-12-28T09:37:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/\"},\"wordCount\":1358,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/notas-sap-julio-2023.jpg\",\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/\",\"name\":\"SAP Security Notes, July 2023 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/notas-sap-julio-2023.jpg\",\"datePublished\":\"2023-07-12T08:07:41+00:00\",\"dateModified\":\"2023-12-28T09:37:39+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from July 2023, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/notas-sap-julio-2023.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/notas-sap-julio-2023.jpg\",\"width\":1200,\"height\":630},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-july-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, July 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, July 2023 - Inprosec","description":"All updates to SAP systems notes from July 2023, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, July 2023","og_description":"All updates to SAP systems notes from July 2023, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/","og_site_name":"Inprosec","article_published_time":"2023-07-12T08:07:41+00:00","article_modified_time":"2023-12-28T09:37:39+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/notas-sap-julio-2023.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, July 2023","datePublished":"2023-07-12T08:07:41+00:00","dateModified":"2023-12-28T09:37:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/"},"wordCount":1358,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/notas-sap-julio-2023.jpg","articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/","name":"SAP Security Notes, July 2023 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/notas-sap-julio-2023.jpg","datePublished":"2023-07-12T08:07:41+00:00","dateModified":"2023-12-28T09:37:39+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from July 2023, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/notas-sap-julio-2023.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/07\/notas-sap-julio-2023.jpg","width":1200,"height":630},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-july-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, July 2023"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9224","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=9224"}],"version-history":[{"count":2,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9224\/revisions"}],"predecessor-version":[{"id":9229,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9224\/revisions\/9229"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/9226"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=9224"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=9224"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=9224"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}