{"id":9444,"date":"2023-09-18T10:29:02","date_gmt":"2023-09-18T08:29:02","guid":{"rendered":"https:\/\/www.inprosec.com\/?p=9444"},"modified":"2023-12-28T11:37:48","modified_gmt":"2023-12-28T09:37:48","slug":"sap-security-notes-september-2023","status":"publish","type":"post","link":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/","title":{"rendered":"SAP Security Notes, September 2023"},"content":{"rendered":"<p><strong>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.<\/strong><\/p>\n\n<h2>September 2023 notes<\/h2>\n<h3>Summary and highlights of the month<\/h3>\n<p>The total number of notes\/patches has been 18, the same as last month. The number of Hot News notes has been 5, which is 3 more than last month. On the other hand, it is worth noting that the number of high-criticality notes has decreased from 8 to 2. As always, we will leave medium and low-criticality notes unchecked this month, but we will provide details for a total of 7 notes (all with a CVSS score of <span style=\"color: #e3c800;\">7<\/span> or higher).<\/p>\n<p>We have a <strong>total of 18 notes<\/strong> for the entire month (the 18 from Patch Tuesday, 13 new and 5 updates, which is the same number of notes as last month&#8217;s Patch Tuesday).<\/p>\n<p>We will review in detail 7 out of the total 7 high-criticality and Hot News notes, 2 of the 5 Hot News notes are new, and the 2 high-criticality notes would be new (those with a CVSS score greater than or equal to 7).<\/p>\n<ol>\n<li><strong>The most critical note of the month<\/strong> (with a <strong>CVSS score of <span style=\"color: #ff0000;\">10<\/span><\/strong>) is an update to the usual note related<strong> to &#8220;Google Chromium.<\/strong>&#8220;<\/li>\n<li>The next critical notes (with <strong>CVSS <span style=\"color: #ff0000;\">9.9<\/span><\/strong>) include 3 Hot News notes, 1 new, related to &#8220;<strong>Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Promotion Management)<\/strong>,&#8221; and the other 2 are updates, one published last March, related to &#8220;<strong>Code Injection vulnerability in SAP Business Objects Business Intelligence Platform (CMC)<\/strong>&#8221; and the other published in December 2022 related to &#8220;<strong>Improper access control in SAP NetWeaver AS Java (User Defined Search)<\/strong>.&#8221;<\/li>\n<li>The next critical note (with <strong>CVSS <span style=\"color: #ff0000;\">9.8<\/span><\/strong>) is related to &#8220;<strong>Missing Authorization check in SAP CommonCryptoLib<\/strong>.&#8221;<\/li>\n<li>The next critical note (with <strong>CVSS <span style=\"color: #ff0000;\">8.7<\/span><\/strong>) is a high-criticality note related to &#8220;<strong>Insufficient File type validation in SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface).<\/strong>&#8220;<\/li>\n<li>The next critical note (with <strong>CVSS <span style=\"color: #e3c800;\">7.5<\/span><\/strong>) is a high-criticality note related to &#8220;<strong>Memory Corruption vulnerability in SAP CommonCryptoLib<\/strong>.&#8221;<\/li>\n<li>This month, the most predominant type is &#8220;<strong>Code Injection<\/strong>&#8221; (3 out of 18 on Patch Day).<\/li>\n<\/ol>\n<p>In the graph (post-September 2023 for SAP), we can see the <span style=\"text-decoration: underline;\"><strong>classification of the notes for September<\/strong><\/span>, as well as the evolution and classification of the last 5 previous months (only the notes from Sec. Tuesday\/Patch Day \u2013 by SAP):<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-9332\" src=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/08\/notas-SAP-agosto-2023.jpg\" alt=\"\" width=\"700\" height=\"368\" srcset=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/08\/notas-SAP-agosto-2023.jpg 1200w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/08\/notas-SAP-agosto-2023-300x158.jpg 300w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/08\/notas-SAP-agosto-2023-1024x538.jpg 1024w, https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/08\/notas-SAP-agosto-2023-600x315.jpg 600w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/><\/p>\n<h3>Full details<\/h3>\n<p>The <strong>complete detail of the most relevant notes<\/strong> is as follows:<\/p>\n<ol>\n<li><strong><u>Update &#8211; Security updates for the browser control Google Chromium delivered with SAP Business Client (2622660):<\/u><\/strong> This security note addresses multiple vulnerabilities in the 3rd party web browser control Chromium, which can be used within SAP Business Client. This note will be modified periodically based on web browser updates by the open-source project Chromium. The note priority is based on the highest CVSS score of all the vulnerabilities fixed in the latest browser release. If the SAP Business Client release is not updated to the latest patch level, displaying web pages in SAP Business Client via this open-source browser control might lead to different vulnerabilities like memory corruption, Information Disclosure and the like. The solution will be to update the SAP Business Client patch to the newest one, which contains the most current stable major release of the Chromium browser control, which passed the SAP internal quality measurements of SAP Business Client. The note has been re-released with updated \u2018Solution\u2019 and \u2018Support Packages &amp; Patches\u2019 information. <strong>CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>10<\/strong><\/span><strong> \/ 10 (Multiple CVE\u00b4s).<\/strong><\/li>\n<li><strong><u>Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Promotion Management)<\/u><\/strong>(<strong><u>3320355):<\/u><\/strong> under certain condition allows an authenticated attacker to view sensitive information which is otherwise restricted. On successful exploitation, the attacker can completely compromise the application causing high impact on confidentiality, integrity, and availability. Note contains a workaround<strong> .CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>9,9<\/strong><\/span><strong> \/ 10 [CVE-2023-40622].<\/strong><\/li>\n<li><strong><u>Update &#8211; Improper access control in SAP NetWeaver AS Java (User Defined Search) (3273480<\/u><\/strong>): An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) and make use of an open naming and directory api to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access for user data, to make limited modifications to user data and to degrade performance of the system, leading to high impact on confidentiality and limited impact on availability and integrity of the application. <strong>CVSS v3 Base Score: <span style=\"color: #ff0000;\">9,9<\/span> \/ 10 [CVE-2022-41272].<\/strong><\/li>\n<li><strong><u>Update &#8211; Code Injection vulnerability in SAP Business Objects Business Intelligence Platform (CMC) (3245526): <\/u><\/strong>In some scenarios, SAP Business Objects Business Intelligence Platform (CMC) Program Object execution can lead to code injection vulnerability which could allow an attacker to gain access to resources that are allowed by extra privileges. Successful attack could highly impact the confidentiality, Integrity, and Availability of the system. In addition to the solution provided by the patch upload, the note contains a workaround also the note has been re-released with updated Support Packages &amp; Patches information. <strong>CVSS v3 Base Score<\/strong><strong>: <span style=\"color: #ff0000;\">9,9<\/span><\/strong><strong> \/ 10 [CVE-2023-25616].<\/strong><\/li>\n<li><strong><u>Missing Authorization check in SAP CommonCryptoLib (3340576<\/u><\/strong>):\u00a0SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired, an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data. C<strong>VSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>9,8<\/strong><\/span><strong> \/ 10 [CVE-2023-40309].<\/strong><\/li>\n<li><strong><u>Insufficient File type validation in SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface) (3370490): <\/u><\/strong>Due to insufficient file type validation, SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface) allows a report creator to upload files from local system into the report over the network. When uploading the image file, an authenticated attacker could intercept the request, modify the content type and the extension to read and modify sensitive data causing a high impact on confidentiality and integrity of the application.<strong> CVSS v3 Base Score: <\/strong><span style=\"color: #ff0000;\"><strong>8,7<\/strong><\/span><strong> \/ 10 [CVE-2023-42472].<\/strong><\/li>\n<li><strong><u>Memory Corruption vulnerability in SAP CommonCryptoLib <\/u><\/strong>(<strong><u>3327896):<\/u><\/strong> SAP CommonCryptoLib allows an unauthenticated attacker to craft a request, which when submitted to an open port causes a memory corruption error in a library which in turn causes the target component to crash making it unavailable. There is no ability to view or modify any information.. <strong> CVSS v3 Base Score: <span style=\"color: #d6c100;\">7,5<\/span> \/ 10 [CVE-2023-40308].<\/strong><\/li>\n<\/ol>\n<h3 style=\"font-weight: 400;\"><strong>Reference links<\/strong><\/h3>\n<p>Other references, from SAP and Onapsis (September):<\/p>\n<p><a href=\"https:\/\/ddec1-0-en-ctp.trendmicro.com:443\/wis\/clicktime\/v1\/query?url=https%3a%2f%2fdam.sap.com%2fmac%2fapp%2fe%2fpdf%2fpreview%2fembed%2fucQrx6G%3fltr%3da%26rc%3d10&amp;umid=8780927f-e301-4dbb-b956-0ee07e663535&amp;auth=708978c2440d0c6de95dfde6471e502ec413f9a9-7b931f29de852470f9891be8f0e84f4998e8e703\">Digital Library (sap.com)<\/a><\/p>\n<p><a href=\"https:\/\/onapsis.com\/blog\/sap-security-patch-day-september-2023\">SAP Security Patch Day for September 2023 (onapsis.com)<\/a><\/p>\n<h3 style=\"font-weight: 400;\"><strong><u>Resources affected<\/u><\/strong><\/h3>\n<div class=\"w-post-elm post_content\">\n<ul>\n<li>AP CommonCryptoLib, Versions\u20138<\/li>\n<li>SAP Business Client, Versions -6.5, 7.0, 7.70<\/li>\n<li>SAP Business Objects Business Intelligence Platform (CMC),Versions\u2013420, 430<\/li>\n<li>SAP BusinessObjects Business Intelligence Platform (Promotion Management), Versions\u2013420,430<\/li>\n<li>SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface),Versions \u2013420<\/li>\n<li>SAP CommonCryptoLib, Versions\u20138<\/li>\n<li>SAP NetWeaver AS ABAP, SAP NetWeaver AS Java and ABAP Platform of S\/4HANA on-premise, Versions -KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.91, KERNEL 7.92, KERNEL 7.93, KERNEL 7.22, KERNEL 8.04, KERNEL64UC 7.22, KERNEL64UC 7.22EXT, KERNEL64UC 7.53, KERNEL64UC 8.04, KERNEL64NUC 7.22, KERNEL64NUC 7.22EXT<\/li>\n<li>SAP NetWeaver Process Integration, Version \u20137.50<\/li>\n<li>SAP Web Dispatcher, Versions -7.22EXT, 7.53, 7.54, 7.77, 7.85, 7.89<\/li>\n<li>SAP_EXTENDED_APP_SERVICES 1, XS_ADVANCED_RUNTIME 1.00<\/li>\n<li>SAPContent Server, Versions -6.50, 7.53, 7.54<\/li>\n<li>SAPExtended Application Services and Runtime (XSA), Versions -SAP_EXTENDED_APP_SERVICES 1, XS_ADVANCED_RUNTIME 1.00<\/li>\n<li>SAPHANA Database, Versions \u20132.0<\/li>\n<li>SAPHost Agent, Versions \u2013722<\/li>\n<li>SAPSSOEXT, Versions \u201317<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems. September 2023 notes Summary and highlights of the month The total number of notes\/patches has been 18, the same as last month. The number of Hot News notes has been 5, which is&#8230;<\/p>\n","protected":false},"author":6,"featured_media":9446,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[95,61],"tags":[],"class_list":["post-9444","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-notes","category-sap-security-en-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>SAP Security Notes, September 2023 - Inprosec<\/title>\n<meta name=\"description\" content=\"All updates to SAP systems notes from September 2023, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Security Notes, September 2023\" \/>\n<meta property=\"og:description\" content=\"All updates to SAP systems notes from September 2023, to stay current and improve the security levels of your SAP systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/\" \/>\n<meta property=\"og:site_name\" content=\"Inprosec\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-18T08:29:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-28T09:37:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/notas-sap-septiembre-2023.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fernando Mosquera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fernando Mosquera\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/\"},\"author\":{\"name\":\"Fernando Mosquera\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"headline\":\"SAP Security Notes, September 2023\",\"datePublished\":\"2023-09-18T08:29:02+00:00\",\"dateModified\":\"2023-12-28T09:37:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/\"},\"wordCount\":1188,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/notas-sap-septiembre-2023.jpg\",\"articleSection\":[\"SAP Notes\",\"SAP Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/\",\"name\":\"SAP Security Notes, September 2023 - Inprosec\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/notas-sap-septiembre-2023.jpg\",\"datePublished\":\"2023-09-18T08:29:02+00:00\",\"dateModified\":\"2023-12-28T09:37:48+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\"},\"description\":\"All updates to SAP systems notes from September 2023, to stay current and improve the security levels of your SAP systems.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/notas-sap-septiembre-2023.jpg\",\"contentUrl\":\"https:\\\/\\\/www.inprosec.com\\\/wp-content\\\/uploads\\\/2023\\\/09\\\/notas-sap-septiembre-2023.jpg\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/sap-security-notes-september-2023\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP Security Notes, September 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/\",\"name\":\"Inprosec\",\"description\":\"Information security is our priority.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.inprosec.com\\\/en\\\/#\\\/schema\\\/person\\\/b05a40c0c3e81b819075dd95a10532e2\",\"name\":\"Fernando Mosquera\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g\",\"caption\":\"Fernando Mosquera\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"SAP Security Notes, September 2023 - Inprosec","description":"All updates to SAP systems notes from September 2023, to stay current and improve the security levels of your SAP systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/","og_locale":"en_US","og_type":"article","og_title":"SAP Security Notes, September 2023","og_description":"All updates to SAP systems notes from September 2023, to stay current and improve the security levels of your SAP systems.","og_url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/","og_site_name":"Inprosec","article_published_time":"2023-09-18T08:29:02+00:00","article_modified_time":"2023-12-28T09:37:48+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/notas-sap-septiembre-2023.jpg","type":"image\/jpeg"}],"author":"Fernando Mosquera","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fernando Mosquera","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/#article","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/"},"author":{"name":"Fernando Mosquera","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"headline":"SAP Security Notes, September 2023","datePublished":"2023-09-18T08:29:02+00:00","dateModified":"2023-12-28T09:37:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/"},"wordCount":1188,"commentCount":0,"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/notas-sap-septiembre-2023.jpg","articleSection":["SAP Notes","SAP Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/","url":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/","name":"SAP Security Notes, September 2023 - Inprosec","isPartOf":{"@id":"https:\/\/www.inprosec.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/#primaryimage"},"image":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/#primaryimage"},"thumbnailUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/notas-sap-septiembre-2023.jpg","datePublished":"2023-09-18T08:29:02+00:00","dateModified":"2023-12-28T09:37:48+00:00","author":{"@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2"},"description":"All updates to SAP systems notes from September 2023, to stay current and improve the security levels of your SAP systems.","breadcrumb":{"@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/#primaryimage","url":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/notas-sap-septiembre-2023.jpg","contentUrl":"https:\/\/www.inprosec.com\/wp-content\/uploads\/2023\/09\/notas-sap-septiembre-2023.jpg","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/www.inprosec.com\/en\/sap-security-notes-september-2023\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inprosec.com\/en\/"},{"@type":"ListItem","position":2,"name":"SAP Security Notes, September 2023"}]},{"@type":"WebSite","@id":"https:\/\/www.inprosec.com\/en\/#website","url":"https:\/\/www.inprosec.com\/en\/","name":"Inprosec","description":"Information security is our priority.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inprosec.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.inprosec.com\/en\/#\/schema\/person\/b05a40c0c3e81b819075dd95a10532e2","name":"Fernando Mosquera","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/199e6c54b14f5b5ddf7e11a9bb0b455c3bed7a9a1a738b7be5c2572878e69d1a?s=96&d=mm&r=g","caption":"Fernando Mosquera"}}]}},"_links":{"self":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9444","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/comments?post=9444"}],"version-history":[{"count":1,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9444\/revisions"}],"predecessor-version":[{"id":9449,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/posts\/9444\/revisions\/9449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media\/9446"}],"wp:attachment":[{"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/media?parent=9444"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/categories?post=9444"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.inprosec.com\/en\/wp-json\/wp\/v2\/tags?post=9444"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}