{"id":2724,"date":"2023-06-20T08:00:31","date_gmt":"2023-06-20T06:00:31","guid":{"rendered":"http:\/\/192.168.20.3\/?p=2724"},"modified":"2024-12-11T13:44:51","modified_gmt":"2024-12-11T12:44:51","slug":"sap-security-patch-day-junio-2023","status":"publish","type":"post","link":"https:\/\/orekait.com\/es\/sap-security-patch-day-junio-2023\/","title":{"rendered":"SAP Security Patch Day<br> <span class=\"font-300\">Junio 2023<\/span>"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Imagen principal&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2023\/06\/Patch-Day-2023.png&#8221; alt=&#8221;cloud-public&#8221; title_text=&#8221;Patch-Day-2023&#8243; admin_label=&#8221;Imagen principal&#8221; module_class=&#8221;post-img&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Cuerpo&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.25.2&#8243; header_2_font_size=&#8221;24px&#8221; header_3_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>A las puertas del verano SAP contin\u00faa ofreci\u00e9ndonos su resumen mensual de las nuevas vulnerabilidades solucionadas en este Security Patch Day de junio, en este post analizaremos las \u00faltimas notas de seguridad liberadas por SAP y las explicamos de la manera m\u00e1s sencilla posible.<\/p>\n<p>En cuanto al an\u00e1lisis cuantitativo, en esta ocasi\u00f3n, SAP ha publicado 13 notas, de las cuales 4 son de importancia high, y no ha liberado ninguna hot new.<\/p>\n<p>En esta ocasi\u00f3n, no vamos a destacar una nota en concreto, pero si queremos se\u00f1alar el esfuerzo de SAP en resolver vulnerabilidades de tipo Cross Site Scripting (XSS) ya que 9 de las 13 notas de esta publicaci\u00f3n resuelven vulnerabilidades de este tipo.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3102769 \u2013 Cross-Site Scripting (XSS) vulnerability in SAP Knowledge Warehouse<\/strong><\/h2>\n<p>Actualizaci\u00f3n de la nota 3102769, que resuelve una vulnerabilidad de cross-site scripting (XSS) en Knowledge Warehouse. En esta actualizaci\u00f3n se renueva la informaci\u00f3n referente a la compatibilidad y parches de las versiones 7.31 y 7.40<\/p>\n<p>Esta vulnerabilidad afecta a SAP KW y permite a atacantes no autorizados llevar a cabo ataques XSS, pudiendo llegar a leer datos confidenciales.<\/p>\n<p>La soluci\u00f3n consiste en mantener SAP KW actualizado a las versiones indicadas en la nota 3102769, aunque tambi\u00e9n disponemos de un workaround documentado en la misma nota.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3324285 \u2013 Stored Cross-Site Scripting (Stored XSS) vulnerability in UI5 Variant Management<\/strong><\/h2>\n<p>Nueva vulnerabilidad en UI5 por la que se podr\u00eda realizar un ataque de tipo Stored Cross Site Scripting. En caso de producirse una explotaci\u00f3n exitosa tendr\u00eda un impacto alto en la confidencialidad, pudiendo ser modificada la informaci\u00f3n, y en la disponibilidad de la aplicaci\u00f3n.<\/p>\n<p>SAP ha resuelto esta vulnerabilidad en las nuevas versiones de SAP_UI, en la nota 3324285 encontramos las versiones de SAP_UI que resuelven esta vulnerabilidad.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3301942 \u2013 Missing Authentication in SAP Plant Connectivity and Production Connector for SAP Digital Manufacturing<\/strong><\/h2>\n<p>Vulnerabilidad que afecta a la integraci\u00f3n de SAP Plant Connectivity o Production Connector con SAP Digital Manufacturing ya que no validan la firma del JSON Web Token (JWT) en la solicitud HTTP enviada desde SAP Digital Manufacturing.<\/p>\n<p>Como consecuencia, los autores de llamada no autorizados de la red interna, podr\u00edan enviar solicitudes de servicio, lo que podr\u00eda afectar a la integridad de la integraci\u00f3n con SAP Digital Manufacturing.<\/p>\n<p>Para resolver esta vulnerabilidad deberemos seguir los pasos indicados en la nota 3304867.<\/p>\n<h2 class=\"has-medium-font-size\"><strong>3326210 \u2013 Improper Neutralization of Input in SAPUI5<\/strong><\/h2>\n<p>Actualizaci\u00f3n de la nota 3326210, analizada en\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-mayo-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">nuestro Security patch day de mayo<\/a>. En esta actualizaci\u00f3n SAP ha actualizado las versiones de SAP_UI que contienen esta soluci\u00f3n y el workaround disponible.<\/p>\n<p>Como coment\u00e1bamos en mayo, debido a la neutralizaci\u00f3n incorrecta de la entrada en SAPUI5, se podr\u00eda realizar una inyecci\u00f3n de c\u00f3digo CSS, pudiendo bloquear la interacci\u00f3n del usuario con la aplicaci\u00f3n y permitiendo al atacante leer o modificar la informaci\u00f3n del usuario a trav\u00e9s de un ataque de phishing.<\/p>\n<p>Debemos actualizar a las versiones de SAPUI5 indicadas en la nota 3326210.<strong><br \/><\/strong><\/p>\n<p><strong>En la siguiente tabla vemos todas las notas liberadas este mes para comprobar si aplican o no en vuestros sistemas:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>Note<\/strong><\/td>\n<td><strong>CVE<\/strong><\/td>\n<td><strong>Title<\/strong><\/td>\n<td><strong>Priority<\/strong><\/td>\n<td><strong>CVSS<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3102769<\/td>\n<td>[Update][CVE-2021-42063]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP Knowledge Warehouse<\/td>\n<td>High<\/td>\n<td>\u00a08.8<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3324285<\/td>\n<td>[CVE-2023-33991]<\/td>\n<td>Stored Cross-Site Scripting (Stored XSS)vulnerability in UI5 Variant Management<\/td>\n<td>High<\/td>\n<td>\u00a08.2<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3301942<\/td>\n<td>[CVE-2023-2827]<\/td>\n<td>Missing Authentication in SAP Plant Connectivity and Production Connector for SAP Digital Manufacturing<\/td>\n<td>High<\/td>\n<td>\u00a07.9<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3326210<\/td>\n<td>[Update][CVE-2023-30743]<\/td>\n<td>Improper Neutralization of Input in SAPUI5<\/td>\n<td>High<\/td>\n<td>\u00a07.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3142092<\/td>\n<td>[Update][CVE-2022-22542]<\/td>\n<td>Information Disclosure vulnerability in SAP S\/4HANA (Supplier Factsheet and Enterprise Search for Business Partner, Supplier and Customer)<\/td>\n<td>Medium<\/td>\n<td>\u00a06.5<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3318657<\/td>\n<td>[CVE-2023-33984]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in NetWeaver (Design Time Repository)<\/td>\n<td>Medium<\/td>\n<td>\u00a06.4<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3331627<\/td>\n<td>[CVE-2023-33985]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Enterprise Portal<\/td>\n<td>Medium<\/td>\n<td>\u00a06.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">2826092<\/td>\n<td>[CVE-2023-33986]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP CRM ABAP (Grantor Management)<\/td>\n<td>Medium<\/td>\n<td>\u00a06.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3322800<\/td>\n<td>[Update] [CVE-2023-30742]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP CRM (WebClient UI)<\/td>\n<td>Medium<\/td>\n<td>\u00a06.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3315971<\/td>\n<td>[Update] [CVE-2023-30742]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP CRM (WebClient UI)<\/td>\n<td>Medium<\/td>\n<td>\u00a06.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3319400<\/td>\n<td>[Update] [CVE-2023-31406]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP BusinessObjects Business Intelligence platform<\/td>\n<td>Medium<\/td>\n<td>\u00a06.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">1794761<\/td>\n<td>[CVE-2023-32115]<\/td>\n<td>SQL Injection in Master Data Synchronization (MDS COMPARE TOOL)<\/td>\n<td>Medium<\/td>\n<td>\u00a04.2<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3325642<\/td>\n<td>[CVE-2023-32114]<\/td>\n<td>Denial of Service in SAP NetWeaver (Change and Transport System)<\/td>\n<td>Low<\/td>\n<td>\u00a02.7<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3322800<\/td>\n<td>[Update] [CVE-2023-30742]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP CRM (WebClient UI)<\/td>\n<td>Medium<\/td>\n<td>\u00a06.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3315971<\/td>\n<td>[Update] [CVE-2023-30742]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP CRM (WebClient UI)<\/td>\n<td>Medium<\/td>\n<td>\u00a06.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">3319400<\/td>\n<td>[Update] [CVE-2023-31406]<\/td>\n<td>Cross-Site Scripting (XSS) vulnerability in SAP BusinessObjects Business Intelligence platform<\/td>\n<td>Medium<\/td>\n<td>\u00a06.1<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>Este mes SAP ha liberado 13 notas de seguridad de las cuales ninguna tiene una puntuaci\u00f3n CVSS por encima de 9.<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>LOW<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>MEDIUM<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>HIGH<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>HOT NEWS<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">Junio<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">8<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>13<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">Mayo<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">10<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">9<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>24<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">Abril<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">15<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>24<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">Marzo<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">10<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">Febrero<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">20<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">Enero<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>12<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>TOTAL<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>7<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>68<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>23<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>18<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>118<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>El desglose de vulnerabilidades encontradas en los sistemas SAP ha sido el siguiente:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Enero<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Febrero<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Marzo<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Abril<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Mayo<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Junio<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Clickjacking<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Code Injection<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>9<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Cross-Site Scripting<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">12<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">9<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>34<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Denial of Service<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>6<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Improper authentication<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>14<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Improper input validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>8<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Information Disclosure<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">12<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>21<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Memory corruption<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>3<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Missing Authorization Check<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">4<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">5<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>12<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Missing input Validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Missing XML Validation<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Remote Code Execution<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>4<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Server Side Request Forgery<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>0<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">SQL Injection<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">1<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">Otros<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">6<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">6<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">3<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\">2<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>22<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-left\" data-align=\"left\">\u00a0<\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>16<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>28<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>22<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>27<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>26<\/strong><\/td>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>135<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>La diferencia de notas liberadas y vulnerabilidades es debido a que una nota puede solucionar m\u00faltiples vulnerabilidades.<\/strong><\/p>\n<p>Nos despedimos recomendando pasarse por el apartado de security notes de SAP Me y analizar las notas liberadas desde la \u00faltima actualizaci\u00f3n de nuestros sistemas e instalar las que apliquen a los sistemas de cada empresa.<\/p>\n<p>Art\u00edculos anteriores de este mismo a\u00f1o 2023:<\/p>\n<p><a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-febrero-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">FEBRERO 2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-marzo-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">MARZO 2023<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-abril-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">ABRIL 2023\u00a0<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-mayo-2023\/\" target=\"_blank\" rel=\"noreferrer noopener\">MAYO2023<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;M\u00e1s informaci\u00f3n&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"morado\">M\u00e1s informaci\u00f3n:<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/orekait.com\/es\/area-administracion-sistemas&#8221; url_new_window=&#8221;on&#8221; button_text=&#8221;M\u00e1s informaci\u00f3n&#8221; module_class=&#8221;entrada-btn&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#8156EA&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_color=&#8221;#8156EA&#8221; button_border_radius=&#8221;30px&#8221; button_font=&#8221;Plus Jakarta Sans|600|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#8156EA&#8221; button_on_hover=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#8156EA&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#8156EA&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_icon_color__hover_enabled=&#8221;on|hover&#8221; button_icon_color__hover=&#8221;#ffffff&#8221;][\/et_pb_button][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; admin_label=&#8221;Noticias relacionadas titulo&#8221; module_id=&#8221;fondo-articulos&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_heading title=&#8221;Quizas te pueda interesar&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Noticias relacionadas&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;-150px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;current&#8221; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A las puertas del verano SAP contin\u00faa ofreci\u00e9ndonos su resumen mensual de las nuevas vulnerabilidades solucionadas en este Security Patch Day de junio, en este post analizaremos las \u00faltimas notas de seguridad liberadas por SAP y las explicamos de la manera m\u00e1s sencilla posible. En cuanto al an\u00e1lisis cuantitativo, en esta ocasi\u00f3n, SAP ha publicado [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2726,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Lorem ipsum dolor sit amet consectetur adipiscing elit congue montes, imperdiet taciti erat elementum fermentum sem ante ultrices ridiculus, sagittis sociis egestas quisque ac semper quis odio. Aenean hendrerit ac metus dis nascetur aliquet mollis integer, rutrum vel laoreet posuere proin sagittis luctus est, tempus duis nisl ultrices parturient tempor praesent. Dignissim curabitur nascetur pellentesque augue fringilla pulvinar eros, tempus fames vehicula maecenas cubilia id, rutrum euismod integer ut scelerisque mus.\r\n\r\nVivamus auctor odio aenean rhoncus natoque dictum purus, volutpat pellentesque laoreet ridiculus consequat nisi varius euismod, augue platea convallis curae magnis taciti. Imperdiet nibh curabitur quisque orci consequat aenean pellentesque, cubilia duis senectus felis sed posuere tortor, magnis enim diam a odio sociis. Enim tellus nisl nec molestie augue luctus tempor habitant, nunc dictumst phasellus volutpat sem facilisis taciti, habitasse laoreet at turpis vel fermentum vulputate.","_et_gb_content_width":"","footnotes":""},"categories":[48,50],"tags":[],"class_list":["post-2724","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-administracion-de-sistemas","category-sap-security-patch-day"],"_links":{"self":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/2724","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/comments?post=2724"}],"version-history":[{"count":8,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/2724\/revisions"}],"predecessor-version":[{"id":21805,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/2724\/revisions\/21805"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media\/2726"}],"wp:attachment":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media?parent=2724"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/categories?post=2724"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/tags?post=2724"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}