{"id":2311,"date":"2023-08-17T08:00:31","date_gmt":"2023-08-17T06:00:31","guid":{"rendered":"http:\/\/192.168.20.3\/?p=2311"},"modified":"2024-12-09T16:40:04","modified_gmt":"2024-12-09T15:40:04","slug":"sap-security-patch-day-agosto-2023","status":"publish","type":"post","link":"https:\/\/orekait.com\/es\/sap-security-patch-day-agosto-2023\/","title":{"rendered":"SAP Security Patch Day<br> <span class=\"font-300\">Agosto 2023<\/span>"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Imagen principal&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2023\/08\/Patch-Day-agosto.png&#8221; alt=&#8221;cloud-public&#8221; title_text=&#8221;Patch-Day-agosto&#8221; admin_label=&#8221;Imagen principal&#8221; module_class=&#8221;post-img&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Cuerpo&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.25.2&#8243; header_2_font_size=&#8221;24px&#8221; header_3_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Desde Oreka IT seguimos pendientes de las nuevas notas de seguridad publicadas por SAP y las resumimos y analizamos brevemente en este art\u00edculo.<\/p>\n<p>Comenzando con el an\u00e1lisis cuantitativo, en esta ocasi\u00f3n, SAP ha publicado 18 notas, de las cuales 8 son de importancia high y 2 son hot news.<\/p>\n<p>En esta nueva entrega, encontramos que se han revisado varias de las notas anteriormente publicadas para documentar las nuevas versiones que incluyen las correcciones de cada vulnerabilidad.<\/p>\n<p><strong>3341460 \u2013 Multiple Vulnerabilities in SAP PowerDesigner<\/strong><\/p>\n<p>Nota de SAP que resuelve dos vulnerabilidades en SAP Power Designer. La primera, con CVE-2023-37483 es una vulnerabilidad de tipo \u201cimproper access control\u201d por la que la aplicaci\u00f3n podr\u00eda permitir a un atacante no autenticado ejecutar consultas arbitrarias contra la BD.<\/p>\n<p>La segunda, es del tipo \u201cinformation disclosure\u201d en la que por el funcionamiento de la aplicaci\u00f3n, el atacante podr\u00eda acceder a los hashes de las contrase\u00f1as desde la memoria del cliente.<\/p>\n<p>Recomendamos aplicar las correcciones indicadas por SAP en la nota 3341460.<\/p>\n<p><strong>3350297 \u2013 OS command injection vulnerability in SAP ECC and SAP S\/4HANA (IS-OIL)<\/strong><\/p>\n<p>Actualizaci\u00f3n de la nota 3350297, que ya comentamos en detalle en el\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-julio-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">security patch day de julio.<\/a><\/p>\n<p>SAP ha actualizado la informaci\u00f3n de la nota para aclarar que solo aplica en los sistemas con el m\u00f3dulo IS-OIL.<\/p>\n<p><strong>3346500 \u2013 Improper authentication in SAP Commerce Cloud<\/strong><\/p>\n<p>Vulnerabilidad que ocurre en algunas configuraciones de SAP Commerce Cloud por la que puede aceptar una contrase\u00f1a vac\u00eda para el ID de usuario, permitiendo a los usuarios iniciar sesi\u00f3n en el sistema sin una contrase\u00f1a.<\/p>\n<p>Esta vulnerabilidad ya ha sido resuelta en las siguientes versiones:<\/p>\n<ul>\n<li><a href=\"https:\/\/help.sap.com\/docs\/SAP_COMMERCE_CLOUD_PUBLIC_CLOUD\/75d4c3895cb346008545900bffe851ce\/f9b65161e1e645249542e59f42f64a7b.html?locale=en-US&amp;version=v2105\" target=\"_blank\" rel=\"noreferrer noopener\">SAP Commerce Cloud Patch Release 2105.25<\/a><\/li>\n<li><a href=\"https:\/\/help.sap.com\/docs\/SAP_COMMERCE_CLOUD_PUBLIC_CLOUD\/75d4c3895cb346008545900bffe851ce\/f9b65161e1e645249542e59f42f64a7b.html?locale=en-US&amp;version=v2205\" target=\"_blank\" rel=\"noreferrer noopener\">SAP Commerce Cloud Patch Release 2205.14<\/a><\/li>\n<li><a href=\"https:\/\/help.sap.com\/docs\/SAP_COMMERCE_CLOUD_PUBLIC_CLOUD\/75d4c3895cb346008545900bffe851ce\/f9b65161e1e645249542e59f42f64a7b.html?locale=en-US\" target=\"_blank\" rel=\"noreferrer noopener\">SAP Commerce Cloud Update Release 2211.9<\/a><\/li>\n<\/ul>\n<p>Adem\u00e1s, en la nota 3346500 SAP describe un workaround que podemos aplicar para mitigar la vulnerabilidad.<\/p>\n<p><strong>3331376 \u2013 Directory Traversal vulnerability in SAP NetWeaver (BI CONT ADD ON)<\/strong><\/p>\n<p>Vulnerabilidad que hemos analizado en el\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-julio-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">security patch day de julio.<\/a><\/p>\n<p>SAP ha actualizado la nota 3331376 a\u00f1adiendo versiones del componente BI_CONT a las que aplica.<\/p>\n<p><strong>3341599 \u2013 Code Injection vulnerability in SAP PowerDesigner<\/strong><\/p>\n<p>SAP SQLA para PowerDesigner 17 incluido con SAP PowerDesigner 16.7 SP06 PL03, permite a un atacante con acceso local al sistema, usar una librer\u00eda maliciosa, que puede ser ejecutada por la aplicaci\u00f3n. Un atacante podr\u00eda as\u00ed controlar el comportamiento de la aplicaci\u00f3n.<\/p>\n<p>La nota 3341599 proporciona un workaround con el que podemos mitigar la vulnerabilidad, aunque indica que la soluci\u00f3n recomendada es actualizar a \u201cSAP SQLA FOR POWERDESIGNER 17\u2033 SP07 PL01.<\/p>\n<p><strong>3358300 \u2013 Cross-Site Scripting (XSS) vulnerability in SAP Business One<\/strong><\/p>\n<p>Vulnerabilidad Cross-site scripting (XSS) en SAP Business One que permite a un atacante insertar c\u00f3digo malicioso en el contenido de una p\u00e1gina web o aplicaci\u00f3n y conseguir que se entregue al cliente. Pudiendo comprometer la confidencialidad, integridad y disponibilidad de la aplicaci\u00f3n.<\/p>\n<p>La correcci\u00f3n a esta vulnerabilidad est\u00e1 incluida en el parche de seguridad FP23051 (Security Hotfix 01).<\/p>\n<p><strong>3317710 \u2013 Binary hijack in SAP Business Objects Business Intelligence Suite (installer)<\/strong><\/p>\n<p>SAP Business Objects Installers permite a un atacante autenticado dentro de la red sobrescribir un archivo ejecutable creado en un directorio temporal durante el proceso de instalaci\u00f3n. Al sustituir este ejecutable por un archivo malicioso, un atacante puede comprometer completamente la confidencialidad, integridad y disponibilidad del sistema.<\/p>\n<p>La nota 3317710 indica las versiones de Business Intelligence Suite que incluyen la soluci\u00f3n a esta vulnerabilidad.<\/p>\n<p><strong>3312047 \u2013 Denial of Service (DoS) vulnerability due to the usage of vulnerable version of Commons FileUpload in SAP BusinessObjects Business Intelligence Platform (CMC)<\/strong><\/p>\n<p>SAP Business Objects Business Intelligence Platform (CMC) utiliza una versi\u00f3n vulnerable de commons-fileupload que es vulnerable a la Denial of Service recogida en el CVE-2023-24998.<\/p>\n<p>La soluci\u00f3n consiste en actualizar commons-fileupload a una versi\u00f3n nueva con la vulnerabilidad resuelta.<\/p>\n<p><strong>3344295 \u2013 Improper Authorization check vulnerability in SAP Message Server<\/strong><\/p>\n<p>Vulnerabilidad por la que lista ACL (Access control list) del servidor de mensajes SAP puede ser eludida en ciertas condiciones, lo que puede permitir a un usuario malicioso autenticado entrar en la red de los sistemas SAP servidos por el servidor de mensajes SAP atacado. Esto puede conducir a la lectura y escritura no autorizada de datos, as\u00ed como hacer que el sistema no est\u00e9 disponible.<\/p>\n<p>Para aplicar la soluci\u00f3n propuesta por SAP deberemos actualizar el kernel del sistema a la versi\u00f3n indicada en la nota 3344295.<\/p>\n<p><strong>3337797 \u2013 SQL Injection vulnerability in SAP Business One (B1i Layer)<\/strong><\/p>\n<p>El m\u00f3dulo B1i de la aplicaci\u00f3n SAP Business One permite a un usuario autenticado con conocimientos profundos, enviar consultas personalizadas a trav\u00e9s de la red para leer o modificar los datos SQL. Si se explota con \u00e9xito, el atacante puede causar un impacto bajo en la confidencialidad y alto en la integridad y disponibilidad de la aplicaci\u00f3n.<\/p>\n<p>SAP ha resuelto esta vulnerabilidad en SAP Business One 10.0 FP2305.<strong><br \/><\/strong><\/p>\n<p><strong>En la siguiente tabla vemos todas las notas liberadas este mes para comprobar si aplican o no en vuestros sistemas:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td><strong>Note<\/strong><\/td>\n<td><strong>Title<\/strong><\/td>\n<td><strong>Priority<\/strong><\/td>\n<td><strong>CVSS<\/strong><\/td>\n<\/tr>\n<tr>\n<td>3341460<\/td>\n<td>Multiple Vulnerabilities in SAP PowerDesigner Additional CVE \u2013 CVE-2023-37484<\/td>\n<td>Hot News<\/td>\n<td>9.8<\/td>\n<\/tr>\n<tr>\n<td>3350297<\/td>\n<td>Update to Security Note released on July 2023 Patch Day: [CVE-2023-36922] OS command injection vulnerability in SAP ECC and SAP S\/4HANA (IS-OIL)<\/td>\n<td>Hot News<\/td>\n<td>9.1<\/td>\n<\/tr>\n<tr>\n<td>3346500<\/td>\n<td>Improper authentication in SAP Commerce Cloud<\/td>\n<td>High<\/td>\n<td>8.8<\/td>\n<\/tr>\n<tr>\n<td>3331376<\/td>\n<td>Update to Security Note released on July 2023 Patch Day:[CVE-2023-33989] Directory Traversal vulnerability in SAP NetWeaver(BI CONT ADD ON)<\/td>\n<td>High<\/td>\n<td>8.7<\/td>\n<\/tr>\n<tr>\n<td>3341599<\/td>\n<td>Code Injection vulnerability in SAP PowerDesigner<\/td>\n<td>High<\/td>\n<td>7.8<\/td>\n<\/tr>\n<tr>\n<td>3358300<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP Business One<\/td>\n<td>High<\/td>\n<td>7.6<\/td>\n<\/tr>\n<tr>\n<td>3317710<\/td>\n<td>Binary hijack in SAP BusinessObjects Business Intelligence Suite (installer)<\/td>\n<td>High<\/td>\n<td>7.6<\/td>\n<\/tr>\n<tr>\n<td>3312047<\/td>\n<td>Denial of Service (DoS) vulnerability due to the usage of vulnerable version of Commons FileUpload in SAP BusinessObjects Business Intelligence Platform (CMC)<\/td>\n<td>High<\/td>\n<td>7.5<\/td>\n<\/tr>\n<tr>\n<td>3344295<\/td>\n<td>Improper Authorization check vulnerability in SAP Message Server<\/td>\n<td>High<\/td>\n<td>7.5<\/td>\n<\/tr>\n<tr>\n<td>3337797<\/td>\n<td>SQL Injection vulnerability in SAP Business One (B1i Layer)<\/td>\n<td>High<\/td>\n<td>\u00a07.1<\/td>\n<\/tr>\n<tr>\n<td>2032723<\/td>\n<td>Update to Security Note released on November 2014 Patch Day: Switchable authorization checks for RFC in SRM<\/td>\n<td>Medium<\/td>\n<td>6.3<\/td>\n<\/tr>\n<tr>\n<td>3350494<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Process Integration<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td>3341934<\/td>\n<td>Information Disclosure vulnerability in SAP Commerce (OCC API)<\/td>\n<td>Medium<\/td>\n<td>5.9<\/td>\n<\/tr>\n<tr>\n<td>2067220<\/td>\n<td>Information Disclosure in SAP Supplier Relationship Management<\/td>\n<td>Medium<\/td>\n<td>5.8<\/td>\n<\/tr>\n<tr>\n<td>3333616<\/td>\n<td>Security Misconfiguration vulnerability in SAP Business One (Service Layer)<\/td>\n<td>Medium<\/td>\n<td>5.3<\/td>\n<\/tr>\n<tr>\n<td>3348000<\/td>\n<td>Missing Authorization check in SAP NetWeaver AS ABAP and ABAP Platform<\/td>\n<td>Medium<\/td>\n<td>4.9<\/td>\n<\/tr>\n<tr>\n<td>3312586<\/td>\n<td>Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform<\/td>\n<td>Medium<\/td>\n<td>4.4<\/td>\n<\/tr>\n<tr>\n<td>3358328<\/td>\n<td>Information disclosure vulnerability in SAP Host Agent<\/td>\n<td>Low<\/td>\n<td>3.7<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>&nbsp;<\/p>\n<p>Este mes SAP ha liberado 18 notas de seguridad de las cuales 2 tienen una puntuaci\u00f3n CVSS por encima de 9.<\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>LOW<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>MEDIUM<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>HIGH<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>HOT NEWS<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Agosto<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">7<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">8<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>18<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Julio<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">9<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">7<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>18<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Junio<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">8<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>13<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Mayo<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">10<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">9<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>24<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Abril<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">15<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>24<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Marzo<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">10<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Febrero<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">20<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Enero<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>12<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>TOTAL<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>8<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>84<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>38<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>22<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>154<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>El desglose de vulnerabilidades encontradas en los sistemas SAP ha sido el siguiente:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Enero<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Febrero<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Marzo<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Abril<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Mayo<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Junio<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Julio<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Agosto<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Clickjacking<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Code Injection<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>12<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Cross-Site Scripting<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">12<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">9<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>36<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Denial of Service<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>11<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Improper authentication<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>18<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Improper input validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>8<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Information Disclosure<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">12<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Memory corruption<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>6<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Missing Authorization Check<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>16<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Missing input Validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Missing XML Validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Remote Code Execution<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>5<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Server Side Request Forgery<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">SQL Injection<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>4<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Otros<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">6<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">6<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>32<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>16<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>28<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>22<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>27<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>21<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>175<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>La diferencia de notas liberadas y vulnerabilidades es debido a que una nota puede solucionar m\u00faltiples vulnerabilidades.<\/p>\n<p>Nos despedimos recomendando que os pas\u00e9is por el apartado de\u00a0<strong>security notes<\/strong>\u00a0de SAP ME para analizar las notas liberadas desde la \u00faltima actualizaci\u00f3n de los sistemas e instalar las que apliquen a los sistemas de vuestra empresa.<\/p>\n<p>Art\u00edculos anteriores de este mismo a\u00f1o 2023:<\/p>\n<p><a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-marzo-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">MARZO 2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-abril-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">ABRIL 2023\u00a0<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-mayo-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">MAYO 2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-junio-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">JUNIO 2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-julio-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">JULIO 2023<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;M\u00e1s informaci\u00f3n&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"morado\">M\u00e1s informaci\u00f3n:<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/orekait.com\/es\/area-administracion-sistemas&#8221; button_text=&#8221;M\u00e1s informaci\u00f3n&#8221; module_class=&#8221;entrada-btn&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#8156EA&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_color=&#8221;#8156EA&#8221; button_border_radius=&#8221;30px&#8221; button_font=&#8221;Plus Jakarta Sans|600|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#8156EA&#8221; button_on_hover=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#8156EA&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#8156EA&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_icon_color__hover_enabled=&#8221;on|hover&#8221; button_icon_color__hover=&#8221;#ffffff&#8221; url_new_window=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; admin_label=&#8221;Noticias relacionadas titulo&#8221; module_id=&#8221;fondo-articulos&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_heading title=&#8221;Quizas te pueda interesar&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Noticias relacionadas&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;-150px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;current&#8221; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Desde Oreka IT seguimos pendientes de las nuevas notas de seguridad publicadas por SAP y las resumimos y analizamos brevemente en este art\u00edculo. Comenzando con el an\u00e1lisis cuantitativo, en esta ocasi\u00f3n, SAP ha publicado 18 notas, de las cuales 8 son de importancia high y 2 son hot news. En esta nueva entrega, encontramos que [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2314,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Lorem ipsum dolor sit amet consectetur adipiscing elit congue montes, imperdiet taciti erat elementum fermentum sem ante ultrices ridiculus, sagittis sociis egestas quisque ac semper quis odio. Aenean hendrerit ac metus dis nascetur aliquet mollis integer, rutrum vel laoreet posuere proin sagittis luctus est, tempus duis nisl ultrices parturient tempor praesent. Dignissim curabitur nascetur pellentesque augue fringilla pulvinar eros, tempus fames vehicula maecenas cubilia id, rutrum euismod integer ut scelerisque mus.\r\n\r\nVivamus auctor odio aenean rhoncus natoque dictum purus, volutpat pellentesque laoreet ridiculus consequat nisi varius euismod, augue platea convallis curae magnis taciti. Imperdiet nibh curabitur quisque orci consequat aenean pellentesque, cubilia duis senectus felis sed posuere tortor, magnis enim diam a odio sociis. Enim tellus nisl nec molestie augue luctus tempor habitant, nunc dictumst phasellus volutpat sem facilisis taciti, habitasse laoreet at turpis vel fermentum vulputate.","_et_gb_content_width":"","footnotes":""},"categories":[48,50],"tags":[],"class_list":["post-2311","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-administracion-de-sistemas","category-sap-security-patch-day"],"_links":{"self":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/2311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/comments?post=2311"}],"version-history":[{"count":6,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/2311\/revisions"}],"predecessor-version":[{"id":20760,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/2311\/revisions\/20760"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media\/2314"}],"wp:attachment":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media?parent=2311"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/categories?post=2311"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/tags?post=2311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}