{"id":2356,"date":"2023-07-21T08:00:31","date_gmt":"2023-07-21T06:00:31","guid":{"rendered":"http:\/\/192.168.20.3\/?p=2356"},"modified":"2024-12-09T16:42:45","modified_gmt":"2024-12-09T15:42:45","slug":"sap-security-patch-day-julio-2023","status":"publish","type":"post","link":"https:\/\/orekait.com\/es\/sap-security-patch-day-julio-2023\/","title":{"rendered":"SAP Security Patch Day<br> <span class=\"font-300\">Julio 2023<\/span>"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Imagen principal&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2023\/07\/Patch-Day-julio.png&#8221; alt=&#8221;cloud-public&#8221; title_text=&#8221;Patch-Day-julio&#8221; admin_label=&#8221;Imagen principal&#8221; module_class=&#8221;post-img&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Cuerpo&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.25.2&#8243; header_2_font_size=&#8221;24px&#8221; header_3_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Llegando al apogeo del verano, desde SAP siguen revisando su software y aplicando importantes correcciones de seguridad que vamos a explicar en este Security Patch Day de julio.<\/p>\n<p>Comenzando con el an\u00e1lisis cuantitativo, en esta ocasi\u00f3n, SAP ha publicado 18 notas, de las cuales 7 son de importancia high, 2 son hot news.<\/p>\n<p>En esta ocasi\u00f3n podemos ver el esfuerzo de SAP en revisar su kernel y hacerlo cada vez m\u00e1s seguro, ya que en este art\u00edculo encontraremos que varias de las notas de seguridad liberadas resuelven diferentes vulnerabilidades del kernel de SAP.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>2622660 \u2013 [Update] Security updates for the browser control Google Chromium delivered with SAP Business Client<\/strong><\/h2>\n<p>Como es habitual, SAP contin\u00faa actualizando la nota 2622660, una nota ya conocida por todos que recopila las \u00faltimas actualizaciones del navegador basado en Chromium integrado en SAP Business Client.<\/p>\n<p>En esta actualizaci\u00f3n, SAP mantiene al d\u00eda las versiones de SAP Business Client con las m\u00faltiples vulnerabilidades que se parchean en cada nueva versi\u00f3n de Chromium, por lo que es muy recomendable mantener actualizada la versi\u00f3n de SAP Bussines Client que estemos utilizando.<\/p>\n<p>En esta ocasi\u00f3n incluye la nueva versi\u00f3n de SAP Business Client 7.70 PL24 y PL23 incluye la nueva versi\u00f3n 114 de Chromium.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3350297 \u2013 [CVE-2023-36922] OS command injection vulnerability in SAP ECC and SAP S\/4HANA (IS-OIL)<\/strong><\/h2>\n<p>Nueva vulnerabilidad resuelta en SAP ECC y S\/4 HANA para el m\u00f3dulo IS-OIL. Por la que debido a un error de programaci\u00f3n en el m\u00f3dulo de funciones e informe, el componente IS-OIL permite que un atacante autenticado inyecte un comando arbitrario del sistema. En una explotaci\u00f3n exitosa, el atacante puede leer o modificar los datos del sistema, as\u00ed como afectar a la disponibilidad del sistema.<\/p>\n<p>Para resolver esta vulnerabilidad deberemos implementar la nota 3350297 en nuestro sistema SAP, ademas disponemos de la nota 3349318 en la que se documentan preguntas frecuentes entorno a esta vulnerabilidad.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3331376 \u2013 [CVE-2023-33989]\u00a0Directory Traversal vulnerability in SAP NetWeaver (BI CONT ADD ON)<\/strong><\/h2>\n<p>Vulnerabilidad mediante la cual un atacante con autorizaciones no administrativas puede explotar un error para sobrescribir archivos del sistema. Los datos de los archivos confidenciales no se pueden leer, pero es posible que algunos archivos del SO se sobrescriban y se comprometa la disponibilidad del sistema.<\/p>\n<p>Para resolver esta vulnerabilidad debemos implementar la nota 3331376, adem\u00e1s SAP ha documentado un workaround para resolver la vulnerabilidad.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3233899 \u2013 [CVE-2023-33987] Request smuggling and request concatenation vulnerability in SAP Web Dispatcher<\/strong><\/h2>\n<p>Vulnerabilidad en SAP NetWeaver AS ABAP y SAP Web Dispatcher mediante la cual un atacante no autenticado puede enviar una solicitud creada con fines malintencionados a trav\u00e9s de una red a un servidor front-end, pudiendo provocar que el servidor confunda los mensajes con otros leg\u00edtimos, pudiendo ejecutar payloads maliciosos en el sistema.<\/p>\n<p>Esta vulnerabilidad puede causar indisponibilidad del sistema y un impacto limitado en la confidencialidad.<\/p>\n<p>Podemos resolver esta vulnerabilidad mediante una actualizaci\u00f3n de kernel al \u00faltimo patch disponible y aplicando el hotfix indicado en la nota 3233899, a nivel de kernel.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3324285 \u2013 [Update][CVE-2023-33991]\u00a0Stored Cross-Site Scripting vulnerability in SAP UI5 (Variant Management)<\/strong><\/h2>\n<p>Actualizaci\u00f3n de la nota 3324285 que describimos en el\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-junio-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Patch Day de junio<\/a>, en esta nueva versi\u00f3n se actualizan las versiones a las que aplica la soluci\u00f3n.<\/p>\n<p>Como coment\u00e1bamos en el art\u00edculo de junio esta vulnerabilidad ocurre en UI5 y permitir\u00eda realizar un ataque de tipo Stored Cross Site Scripting. En caso de producirse una explotaci\u00f3n exitosa tendr\u00eda un impacto alto en la confidencialidad, pudiendo ser modificada la informaci\u00f3n, y en la disponibilidad de la aplicaci\u00f3n.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3331029 \u2013 [CVE-2023-33990]\u00a0Denial of service (DOS) vulnerability in SAP SQL Anywhere<\/strong><\/h2>\n<p>Nueva vulnerabilidad que afecta a SAP SQL Anywhere y permite que un atacante evite que los usuarios leg\u00edtimos accedan al servicio bloqueando el servicio. Un atacante con una cuenta con pocos privilegios y acceso al sistema local puede escribir en los objetos de memoria compartida, pudiendo provocar una denegaci\u00f3n de servicio. Adem\u00e1s, podr\u00eda modificar datos confidenciales en objetos de memoria compartida.<\/p>\n<p>Este problema solo afecta a SAP SQL Anywhere en Windows. Otras plataformas no se ven afectadas.<\/p>\n<p>SAP indica que se ha corregido en la versi\u00f3n SAP SQL Anywhere 17.0 SP1 PL11 y posteriores.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3340735 \u2013 [CVE-2023-35871]\u00a0Memory Corruption vulnerability in SAP Web Dispatcher<\/strong><\/h2>\n<p>Vulnerabilidad que afecta a SAP Web Dispatcher y que puede ser aprovechada por un atacante no autenticado para causar da\u00f1os en la memoria a trav\u00e9s de errores l\u00f3gicos en la gesti\u00f3n de la memoria. Esto puede conducir a la divulgaci\u00f3n de informaci\u00f3n o bloqueos del sistema, lo que puede tener un impacto bajo en la confidencialidad y un alto impacto en la integridad y disponibilidad del sistema.<\/p>\n<p>Podemos resolver esta vulnerabilidad con una actualizaci\u00f3n de kernel y aplicar el hotfix indicado.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3352058 \u2013 [CVE-2023-36925] Unauthenticated blind SSRF in SAP Solution Manager (Diagnostics agent)<\/strong><\/h2>\n<p>Vulnerabilidad mediante la cual diagnostic agent de SAP Solution Manager permite que un atacante no autenticado ejecute solicitudes HTTP a ciegas. En una explotaci\u00f3n exitosa, el atacante puede causar un impacto limitado en la confidencialidad y disponibilidad de la aplicaci\u00f3n y otras aplicaciones a las que puede acceder el diagnostic agent.<\/p>\n<p>Para resolver esta vulnerabilidad debemos revisar la informaci\u00f3n dada en la nota 2686969.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3348145 \u2013 [CVE-2023-36921] Header Injection in SAP Solution Manager (Diagnostic Agent)<\/strong><\/h2>\n<p>SAP Solution Manager diagnostic agent permite que un atacante altere los encabezados en una solicitud de cliente de esta manera proporciona contenido alterado al servidor. En una explotaci\u00f3n exitosa, el atacante puede causar un impacto limitado en la confidencialidad y disponibilidad de la aplicaci\u00f3n.<\/p>\n<p>Para resolver esta vulnerabilidad debemos revisar la informaci\u00f3n dada en la nota 2686969.<\/p>\n<p>En la siguiente tabla vemos todas las notas liberadas este mes para comprobar si aplican o no en vuestros sistemas:<\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>Note<\/strong><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>CVE<\/strong><\/td>\n<td><strong>Title<\/strong><\/td>\n<td><strong>Priority<\/strong><\/td>\n<td><strong>CVSS<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">2622660<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[Update]<\/td>\n<td>Security updates for the browser control Google Chromium delivered with SAP Business Client<\/td>\n<td>Hot News<\/td>\n<td>10.0<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3350297<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-36922]<\/td>\n<td>OS command injection vulnerability in SAP ECC and SAP S\/4HANA (IS-OIL)<\/td>\n<td>Hot News<\/td>\n<td>9.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3331376<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-33989]<\/td>\n<td>Directory Traversal vulnerability in SAP NetWeaver (BI CONT ADD ON)<\/td>\n<td>High<\/td>\n<td>8.7<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3233899<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-33987]<\/td>\n<td>Request smuggling and request concatenation vulnerability in SAP Web Dispatcher<\/td>\n<td>High<\/td>\n<td>8.6<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3324285<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[Update][CVE-2023-33991]<\/td>\n<td>\u00a0Stored Cross-Site Scripting vulnerability in SAP UI5 (Variant Management)<\/td>\n<td>High<\/td>\n<td>8.2<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3331029<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-33990]<\/td>\n<td>Denial of service (DOS) vulnerability in SAP SQL Anywhere<\/td>\n<td>High<\/td>\n<td>7.8<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3340735<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-35871]<\/td>\n<td>Memory Corruption vulnerability in SAP Web Dispatcher<\/td>\n<td>High<\/td>\n<td>7.7<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3352058<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-36925]<\/td>\n<td>Unauthenticated blind SSRF in SAP Solution Manager (Diagnostics agent)<\/td>\n<td>High<\/td>\n<td>7.2<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3348145<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-36921]<\/td>\n<td>Header Injection in SAP Solution Manager (Diagnostic Agent)<\/td>\n<td>High<\/td>\n<td>7.2<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3343547<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-35873]<\/td>\n<td>Missing Authentication check in SAP NetWeaver Process Integration (Runtime Workbench)<\/td>\n<td>Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3343564<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-35872]<\/td>\n<td>Missing Authentication check in SAP NetWeaver Process Integration (Message Display Tool)<\/td>\n<td>Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3341211<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-35870]<\/td>\n<td>Improper Access Control in SAP S\/4HANA (Manage Journal Entry Template)<\/td>\n<td>Medium<\/td>\n<td>6.3<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3326769<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[Multiple CVEs]<\/td>\n<td>Multiple Vulnerabilities in SAP Enable Now CVEs \u2013 CVE-2023-33988, CVE-2023-36918, CVE-2023-36920, CVE-2023-36919<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3318850<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-35874]<\/td>\n<td>Improper authentication vulnerability in SAP NetWeaver AS ABAP and ABAP Platform<\/td>\n<td>Medium<\/td>\n<td>6.0<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3320702<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-36917]<\/td>\n<td>Password Change rate limit bypass in SAP BusinessObjects Business Intelligence Platform<\/td>\n<td>Medium<\/td>\n<td>5.9<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3324732<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-31405]<\/td>\n<td>Log Injection vulnerability in SAP NetWeaver AS for Java (Log Viewer)<\/td>\n<td>Medium<\/td>\n<td>5.3<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3351410<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-36924]<\/td>\n<td>Log Injection vulnerability in SAP ERP Defense Forces and Public Security<\/td>\n<td>Medium<\/td>\n<td>4.9<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3088078<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2023-33992]<\/td>\n<td>Missing Authorization Check in SAP Business Warehouse and SAP BW\/4HANA<\/td>\n<td>Medium<\/td>\n<td>4.5<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>&nbsp;<\/p>\n<p>Este mes SAP ha liberado 18 notas de seguridad de las cuales 2 tienen una puntuaci\u00f3n CVSS por encima de 9.<\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>LOW<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>MEDIUM<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>HIGH<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>HOT NEWS<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>Julio<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">9<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">7<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>18<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>Junio<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">8<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>13<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>Mayo<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">10<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">9<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>24<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>Abril<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">15<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>24<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>Marzo<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">10<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>Febrero<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">20<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>Enero<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>12<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>TOTAL<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>7<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>77<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>30<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>20<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>136<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>El desglose de vulnerabilidades encontradas en los sistemas SAP ha sido el siguiente:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Enero<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Febrero<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Marzo<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Abril<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Mayo<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Junio<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Julio<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Clickjacking<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Code Injection<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>10<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Cross-Site Scripting<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">12<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">9<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>34<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Denial of Service<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>10<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Improper authentication<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>14<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Improper input validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>8<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Information Disclosure<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">12<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>21<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Memory corruption<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>6<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Missing Authorization Check<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>15<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Missing input Validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Missing XML Validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Remote Code Execution<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>5<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Server Side Request Forgery<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">SQL Injection<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>3<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Otros<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">6<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">6<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>27<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>16<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>28<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>22<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>27<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>154<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>La diferencia de notas liberadas y vulnerabilidades es debido a que una nota puede solucionar m\u00faltiples vulnerabilidades.<\/p>\n<p>Nos despedimos recomendando pasarse por el apartado de\u00a0<strong>security notes<\/strong>\u00a0de SAP ME y analizar las notas liberadas desde la \u00faltima actualizaci\u00f3n de nuestros sistemas e instalar las que apliquen a los sistemas de cada empresa.<\/p>\n<p>Art\u00edculos anteriores de este mismo a\u00f1o 2023:<\/p>\n<p><a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-febrero-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">FEBRERO 2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-marzo-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">MARZO 2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-abril-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">ABRIL 2023\u00a0<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-mayo-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">MAYO2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-junio-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">JUNIO2023<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;M\u00e1s informaci\u00f3n&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"morado\">M\u00e1s informaci\u00f3n:<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/orekait.com\/es\/area-administracion-sistemas&#8221; button_text=&#8221;M\u00e1s informaci\u00f3n&#8221; module_class=&#8221;entrada-btn&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#8156EA&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_color=&#8221;#8156EA&#8221; button_border_radius=&#8221;30px&#8221; button_font=&#8221;Plus Jakarta Sans|600|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#8156EA&#8221; button_on_hover=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#8156EA&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#8156EA&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_icon_color__hover_enabled=&#8221;on|hover&#8221; button_icon_color__hover=&#8221;#ffffff&#8221; url_new_window=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; admin_label=&#8221;Noticias relacionadas titulo&#8221; module_id=&#8221;fondo-articulos&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_heading title=&#8221;Quizas te pueda interesar&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Noticias relacionadas&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;-150px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;current&#8221; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Llegando al apogeo del verano, desde SAP siguen revisando su software y aplicando importantes correcciones de seguridad que vamos a explicar en este Security Patch Day de julio. Comenzando con el an\u00e1lisis cuantitativo, en esta ocasi\u00f3n, SAP ha publicado 18 notas, de las cuales 7 son de importancia high, 2 son hot news. En esta [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2358,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Lorem ipsum dolor sit amet consectetur adipiscing elit congue montes, imperdiet taciti erat elementum fermentum sem ante ultrices ridiculus, sagittis sociis egestas quisque ac semper quis odio. Aenean hendrerit ac metus dis nascetur aliquet mollis integer, rutrum vel laoreet posuere proin sagittis luctus est, tempus duis nisl ultrices parturient tempor praesent. Dignissim curabitur nascetur pellentesque augue fringilla pulvinar eros, tempus fames vehicula maecenas cubilia id, rutrum euismod integer ut scelerisque mus.\r\n\r\nVivamus auctor odio aenean rhoncus natoque dictum purus, volutpat pellentesque laoreet ridiculus consequat nisi varius euismod, augue platea convallis curae magnis taciti. Imperdiet nibh curabitur quisque orci consequat aenean pellentesque, cubilia duis senectus felis sed posuere tortor, magnis enim diam a odio sociis. Enim tellus nisl nec molestie augue luctus tempor habitant, nunc dictumst phasellus volutpat sem facilisis taciti, habitasse laoreet at turpis vel fermentum vulputate.","_et_gb_content_width":"","footnotes":""},"categories":[50],"tags":[],"class_list":["post-2356","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sap-security-patch-day"],"_links":{"self":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/2356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/comments?post=2356"}],"version-history":[{"count":6,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/2356\/revisions"}],"predecessor-version":[{"id":20768,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/2356\/revisions\/20768"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media\/2358"}],"wp:attachment":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media?parent=2356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/categories?post=2356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/tags?post=2356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}