{"id":4940,"date":"2022-10-19T08:00:31","date_gmt":"2022-10-19T06:00:31","guid":{"rendered":"http:\/\/192.168.20.3\/?p=4940"},"modified":"2024-12-10T12:47:09","modified_gmt":"2024-12-10T11:47:09","slug":"sap-security-patch-day-octubre-2022","status":"publish","type":"post","link":"https:\/\/orekait.com\/es\/sap-security-patch-day-octubre-2022\/","title":{"rendered":"SAP Security Patch Day<br> <span class=\"font-300\">Octubre 2022<\/span>"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Imagen principal&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2022\/10\/octubre-22-Patch-Day.png&#8221; alt=&#8221;cloud-public&#8221; title_text=&#8221;octubre-22-Patch-Day&#8221; admin_label=&#8221;Imagen principal&#8221; module_class=&#8221;post-img&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Cuerpo&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.25.2&#8243; header_2_font_size=&#8221;24px&#8221; header_3_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; content__hover_enabled=&#8221;off|desktop&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<p>Retomamos el an\u00e1lisis de las notas de seguridad publicadas por SAP en el security patch day. Ya que desde Oreka IT seguimos considerando importante continuar con la divulgaci\u00f3n de estas<strong>\u00a0actualizaciones<\/strong>\u00a0porque es la mejor forma de explicar la criticidad de mantener actualizadas las aplicaciones corporativas.<\/p>\n<p>Comenzando con el an\u00e1lisis cuantitativo, en esta n<strong>ueva publicaci\u00f3n del security patch day SAP ha publicado 17 notas, de las cuales 8 son de importancia\u00a0<em>high<\/em>, y 2 de ellas han sido clasificadas como\u00a0<em>hot news<\/em>.<\/strong><\/p>\n<p>Estas vulnerabilidades nos recuerdan la importancia de mantener nuestras aplicaciones corporativas actualizadas.<\/p>\n<p><strong>A continuaci\u00f3n, analizaremos estas 8 notas:<\/strong><\/p>\n<p><strong>3242933 \u2013 File path traversal vulnerability in SAP Manufacturing Execution<\/strong><\/p>\n<p>En la nota 3242933 SAP documenta la vulnerabilidad en SAP Manufacturing Execution que permite a un atacante aprovechar el campo de ruta de fichero para guardar ficheros en directorios arbitrarios del servidor remoto, pudiendo ser le\u00eddo ese fichero y producirse una fuga de informaci\u00f3n.<\/p>\n<p>Esta vulnerabilidad est\u00e1 presente desde las versiones ME 15.1.3 hasta la 15.4. Esta vulnerabilidad ya est\u00e1 cubierta en las versiones superiores a la 15.4, por lo tanto, esas versiones no requieren ser parcheadas.<\/p>\n<p>En caso de vernos afectados la soluci\u00f3n propuesta por SAP consiste en actualizar a una versi\u00f3n en la que esta vulnerabilidad est\u00e9 resuelta, aunque tambi\u00e9n podemos seguir las recomendaciones del workaround indicadas en la nota a modo preventivo.<\/p>\n<p><strong>3239152 \u2013 Account hijacking through URL Redirection vulnerability in SAP Commerce login form<\/strong><\/p>\n<p>Importante vulnerabilidad en SAP commerce, ya que existe la posibilidad de que el login de SAP commerce sea manipulado mediante una URL y el atacante reciba las credenciales de las v\u00edctimas que tratan de iniciar sesi\u00f3n, pudiendo comprometer la confidencialidad, integridad y disponibilidad del sistema.<\/p>\n<p>El atacante podr\u00eda usar t\u00e9cnicas de phishing para distribuir la URL manipulada entre usuarios leg\u00edtimos de la aplicaci\u00f3n, si un usuario intentase acceder a SAP Commerce mediante esa URL estar\u00eda proporcionando sus datos de acceso al atacante.<\/p>\n<p>Esta vulnerabilidad afecta a las instalaciones de SAP Commerce con OAuth activado, por defecto est\u00e1 activado.<\/p>\n<p>A continuaci\u00f3n, indicamos las versiones de SAP Commerce que han cubierto esta vulnerabilidad:<\/p>\n<p>SAP Commerce Cloud Patch Release 2205.4<\/p>\n<p>SAP Commerce Cloud Patch Release 2105.15<\/p>\n<p>SAP Commerce Cloud Patch Release 2011.25<\/p>\n<p>SAP Commerce Cloud Patch Release 2005.30<\/p>\n<p>SAP Commerce Cloud Patch Release 1905.46<\/p>\n<p>Adem\u00e1s, SAP documenta otras medidas que podemos tomar, c\u00f3mo quitar la extensi\u00f3n OAuth de nuestra instalaci\u00f3n y filtrar las peticiones sospechosas.<\/p>\n<p><strong>3229132 \u2013 Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Monitoring DB)<\/strong><\/p>\n<p>Vulnerabilidad en SAP BusinessObjects Business Intelligence Platform, en la que se descubre que bajo ciertas condiciones un atacante autenticado como administrador puede ver credenciales del SO sin encriptar. Con estas credenciales se puede comprometer la disponibilidad e integridad del sistema.<\/p>\n<p>La soluci\u00f3n propuesta por SAP pasa por actualizar la aplicaci\u00f3n a las versiones indicadas en la nota 3229132:<\/p>\n<ul>\n<li>SBOP BI PLATFORM SERVERS 4.2 SP009 \u2013 Patch 1000<\/li>\n<li>SBOP BI PLATFORM SERVERS 4.3 SP002 \u2013 patch 600<\/li>\n<li>SBOP BI PLATFORM SERVERS 4.3 SP003 \u2013 Patch 0<\/li>\n<\/ul>\n<p><strong>3213507 \u2013 Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform<\/strong><\/p>\n<p>Vulnerabilidad en SAP BusinessObjects Business Intelligence Platform, en la que se resuelve la vulnerabilidad CVE-2022-31596 por la que, en ciertas condiciones, un atacante autenticado c\u00f3mo CMS administrator con altos privilegios en la red, puede acceder a BOE Monitoring database pudiendo obtener y modificar datos del sistema que deber\u00edan estar restringidos. Adem\u00e1s, esta vulnerabilidad puede ser usada para impactar en la base de datos.<\/p>\n<p>Mediante esta vulnerabilidad, el ataque puede tener un impacto bajo en confidencialidad, alto en integridad y bajo en disponibilidad.<\/p>\n<p>La soluci\u00f3n propuesta por SAP pasa por actualizar la aplicaci\u00f3n a las versiones indicadas en la nota 3213507, aunque nuestra recomendaci\u00f3n es actualizar a la \u00faltima version disponible para cubrir otras vulnerabilidades como la recogida en la nota 3229132.<\/p>\n<p><strong>3232021 \u2013 Buffer Overflow in SAP SQL Anywhere and SAP IQ<\/strong><\/p>\n<p>SAP SQL Anywhere y los servidores SAP IQ database son vulnerables a un ataque remoto sin necesidad de autenticaci\u00f3n, provocando una saturaci\u00f3n (overflow) del buffer cuando el servidor esta en modo debugging. El impacto de esta vulnerabilidad es:<\/p>\n<ul>\n<li>Leer y modificar datos no autorizados<\/li>\n<li>Impacto directo en la disponibilidad del sistema<\/li>\n<\/ul>\n<p>Como soluci\u00f3n, SAP indica no utilizar el modo debug al menos hasta actualizar a las versiones indicadas en la nota 3232021, en las que se resuelve esta vulnerabilidad.<\/p>\n<p><strong>3239293 \u2013 Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (AdminTools\/ Query Builder)<\/strong><\/p>\n<p>Vulnerabilidad en SAP BusinessObjects Business Intelligence Platform, por la que bajo ciertas circunstancias las aplicaciones BOE Admin Tools y BOE SDK permiten a un atacante acceder a informaci\u00f3n que deber\u00eda estar restringida.<\/p>\n<p>Aconsejamos actualizar al \u00faltimo parche disponible para la versi\u00f3n de SBOP BI PLATFORM SERVERS que aplica a cada caso, ya que como estamos viendo en este art\u00edculo hay varias vulnerabilidades que han sido corregidas.<\/p>\n<p><strong>3245928, 3245929 \u2013 Multiple vulnerabilities in SAP 3D Visual Enterprise Viewer y SAP 3D Visual Enterprise Author<\/strong><\/p>\n<p>Notas que mejoran de forma notable la seguridad de las aplicaciones SAP 3D Visual Enterprise Viewer y SAP 3D Visual Enterprise Author, ya que en ellas se tratan vulnerabilidades que debido a problemas en la gesti\u00f3n de la memoria una v\u00edctima que abra un fichero manipulado puede verse afectada de m\u00faltiples maneras, en resumen, puede verse en los siguientes escenarios:<\/p>\n<ul>\n<li>Ejecuci\u00f3n arbitraria de c\u00f3digo, que podr\u00eda lanzar un payload. Pudiendo tener m\u00faltiples consecuencias.<\/li>\n<li>Denegaci\u00f3n de servicio, dejando indisponible la aplicaci\u00f3n.<\/li>\n<\/ul>\n<p>SAP recomienda actualizar a las versiones especificadas en las notas 3245928, 3245929.<strong><br \/><\/strong><\/p>\n<p><strong>En el siguiente cuadro, todas las notas liberadas este mes para comprobar si aplican o no en vuestros sistemas:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table class=\"has-white-background-color has-background\">\n<tbody>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\"><strong>Note<\/strong><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>CVE<\/strong><\/td>\n<td class=\"has-text-align-left\" data-align=\"left\"><strong>Title<\/strong><\/td>\n<td><strong>Component<\/strong><\/td>\n<td><strong>Priority<\/strong><\/td>\n<td><strong>CVSS<\/strong><\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3242933<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-39802]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">File path traversal vulnerability in SAP Manufacturing Execution<\/td>\n<td>MFG-ME<\/td>\n<td>Hot News<\/td>\n<td>9.9<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3239152<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-41204]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Account hijacking through URL Redirection vulnerability in SAP Commerce login form<\/td>\n<td>CEC-COM-CPS<\/td>\n<td>Hot News<\/td>\n<td>9.6<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3229132<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-39013]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Program Objects)<\/td>\n<td>BI-BIP-ADM<\/td>\n<td>High<\/td>\n<td>8.2<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3213507<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-31596]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Monitoring DB)<\/td>\n<td>BI-BIP-ADM<\/td>\n<td>High<\/td>\n<td>8.2<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3232021<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-35292]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Buffer Overflow in SAP SQL Anywhere and SAP IQ<\/td>\n<td>BC-SYB-SQA<\/td>\n<td>High<\/td>\n<td>8.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3239293<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-39015]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (AdminTools\/ Query Builder)<\/td>\n<td>BI-BIP-ADM<\/td>\n<td>High<\/td>\n<td>7.7<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3245928<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[Multiple CVEs]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[Multiple CVEs] Multiple vulnerabilities in SAP 3D Visual Enterprise Viewer<\/td>\n<td>CA-VE-VEV<\/td>\n<td>High<\/td>\n<td>7.0<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3245929<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[Multiple CVEs]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[Multiple CVEs] Multiple vulnerabilities in SAP 3D Visual Enterprise Author<\/td>\n<td>CA-VE-VEA<\/td>\n<td>High<\/td>\n<td>7.0<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3233226<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-35296]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Version Management System)<\/td>\n<td>BI-BIP-LCM<\/td>\n<td>Medium<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3049899<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-35297]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Stored Cross-Site Scripting (XSS) vulnerability in SAP Enable Now<\/td>\n<td>KM-SEN-MGR<\/td>\n<td>Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3202523<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Related CVE \u2013 CVE-2021-41184<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Cross-Site Scripting (XSS) vulnerability in SAP Commerce<\/td>\n<td>CEC-COM-CPS<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3211161<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-39800]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Cross-Site Scripting (XSS) vulnerability in SAP BusinessObjects Business Intelligence Platform (BI LaunchPad)<\/td>\n<td>BI-BIP-INV<\/td>\n<td>Medium<\/td>\n<td>6.1<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3213524<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-32244]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Commentary DB)<\/td>\n<td>BI-BIP-CMC<\/td>\n<td>Medium<\/td>\n<td>6.9<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3229425<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-41206]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Cross-Site Scripting (XSS) vulnerability in SAP BusinessObjects Business Intelligence platform \/ Analysis for OLAP<\/td>\n<td>BI-RA-AWB<\/td>\n<td>Medium<\/td>\n<td>5.4<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3248384<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-41210]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Information Disclosure Vulnerability in SAP Customer Data Cloud (Gigya)<\/td>\n<td>CEC-PRO-GIY<\/td>\n<td>Medium<\/td>\n<td>4.9<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3248970<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-41209]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Information Disclosure Vulnerability in SAP Customer Data Cloud (Gigya)<\/td>\n<td>CEC-PRO-GIY<\/td>\n<td>Medium<\/td>\n<td>4.9<\/td>\n<\/tr>\n<tr>\n<td class=\"has-text-align-center\" data-align=\"center\">3167342<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">[CVE-2022-35226]<\/td>\n<td class=\"has-text-align-left\" data-align=\"left\">Cross-Site Scripting (XSS) vulnerability in Data Services Management Console<\/td>\n<td>EIM-DS-SVR<\/td>\n<td>Medium<\/td>\n<td>4.8<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p>Este mes SAP ha liberado 17 notas de seguridad de las cuales 2 tienen una puntuaci\u00f3n CVSS por encima de 9.<\/p>\n<p>&nbsp;<\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table>\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td><strong>LOW<\/strong><\/td>\n<td><strong>MEDIUM<\/strong><\/td>\n<td><strong>HIGH<\/strong><\/td>\n<td><strong>HOT NEWS<\/strong><\/td>\n<td>TOTAL<\/td>\n<\/tr>\n<tr>\n<td>Enero<\/td>\n<td>1<\/td>\n<td>5<\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td><strong>9<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Febrero<\/td>\n<td>1<\/td>\n<td>6<\/td>\n<td>3<\/td>\n<td>9<\/td>\n<td><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Marzo<\/td>\n<td>1<\/td>\n<td>10<\/td>\n<td>1<\/td>\n<td>4<\/td>\n<td><strong>16<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Abril<\/td>\n<td>2<\/td>\n<td>17<\/td>\n<td>7<\/td>\n<td>7<\/td>\n<td><strong>33<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Mayo<\/td>\n<td>\u00a0<\/td>\n<td>8<\/td>\n<td>2<\/td>\n<td>4<\/td>\n<td><strong>14<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Junio<\/td>\n<td>2<\/td>\n<td>7<\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td><strong>12<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Julio<\/td>\n<td>1<\/td>\n<td>20<\/td>\n<td>5<\/td>\n<td>\u00a0<\/td>\n<td><strong>26<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Agosto<\/td>\n<td>\u00a0<\/td>\n<td>5<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td><strong>7<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Septiembre<\/td>\n<td>\u00a0<\/td>\n<td>6<\/td>\n<td>6<\/td>\n<td>1<\/td>\n<td><strong>13<\/strong><\/td>\n<\/tr>\n<tr>\n<td>Octubre<\/td>\n<td>\u00a0<\/td>\n<td>9<\/td>\n<td>6<\/td>\n<td>2<\/td>\n<td><strong>17<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>TOTAL<\/strong><\/td>\n<td><strong>8<\/strong><\/td>\n<td><strong>93<\/strong><\/td>\n<td><strong>35<\/strong><\/td>\n<td><strong>30<\/strong><\/td>\n<td><strong>166<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>El desglose de vulnerabilidades encontradas en los sistemas SAP ha sido el siguiente:<\/strong><\/p>\n<figure class=\"wp-block-table is-style-stripes\">\n<table class=\"has-white-background-color has-background\">\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td><strong>Enero<\/strong><\/td>\n<td><strong>Febrero<\/strong><\/td>\n<td><strong>Marzo<\/strong><\/td>\n<td><strong>Abril<\/strong><\/td>\n<td><strong>Mayo<\/strong><\/td>\n<td><strong>Junio<\/strong><\/td>\n<td><strong>Julio<\/strong><\/td>\n<td><strong>Agosto<\/strong><\/td>\n<td><strong>Septiembre<\/strong><\/td>\n<td><strong>Octubre<\/strong><\/td>\n<td><strong>TOTAL<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Clickjacking<\/strong><\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Code Injection<\/strong><\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>3<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>2<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>9<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Cross-Site Scripting<\/strong><\/td>\n<td>2<\/td>\n<td>2<\/td>\n<td>4<\/td>\n<td>4<\/td>\n<td>3<\/td>\n<td>1<\/td>\n<td>7<\/td>\n<td>\u00a0<\/td>\n<td>4<\/td>\n<td>5<\/td>\n<td><strong>32<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Denial of Service<\/strong><\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>2<\/td>\n<td>4<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>2<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>9<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Improper authentication<\/strong><\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Improper input validation<\/strong><\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>2<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>7<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Information Disclosure<\/strong><\/td>\n<td>4<\/td>\n<td>2<\/td>\n<td>4<\/td>\n<td>6<\/td>\n<td>4<\/td>\n<td>1<\/td>\n<td>7<\/td>\n<td>4<\/td>\n<td>2<\/td>\n<td>6<\/td>\n<td><strong>40<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Memory corruption<\/strong><\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td><strong>3<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Missing Authorization Check<\/strong><\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td>5<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td>6<\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Missing input Validation<\/strong><\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Missing XML Validation<\/strong><\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>3<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>3<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Remote Code Execution<\/strong><\/td>\n<td>1<\/td>\n<td>7<\/td>\n<td>1<\/td>\n<td>6<\/td>\n<td>4<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>2<\/td>\n<td><strong>22<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Server Side Request Forgery<\/strong><\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>2<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>2<\/td>\n<td><strong>4<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>SQL Injection<\/strong><\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td><strong>Otros<\/strong><\/td>\n<td>\u00a0<\/td>\n<td>2<\/td>\n<td>\u00a0<\/td>\n<td>6<\/td>\n<td>1<\/td>\n<td>6<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td>4<\/td>\n<td>3<\/td>\n<td><strong>24<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td><strong>12<\/strong><\/td>\n<td><strong>19<\/strong><\/td>\n<td><strong>16<\/strong><\/td>\n<td><strong>36<\/strong><\/td>\n<td><strong>14<\/strong><\/td>\n<td><strong>15<\/strong><\/td>\n<td><strong>28<\/strong><\/td>\n<td><strong>7<\/strong><\/td>\n<td><strong>12<\/strong><\/td>\n<td><strong>20<\/strong><\/td>\n<td><strong>112<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<p><strong>La diferencia de notas liberadas y vulnerabilidades es debido a que una nota puede solucionar m\u00faltiples vulnerabilidades.<\/strong><\/p>\n<p><strong>Nos despedimos recomendando pasarse por el apartado de\u00a0<\/strong><strong>security notes<\/strong><strong>\u00a0del Launchpad de SAP y analizar las notas liberadas desde la \u00faltima actualizaci\u00f3n de nuestros sistemas e instalar las que apliquen a los sistemas de cada empresa.<\/strong><\/p>\n<p><strong>Fuentes:<\/strong><\/p>\n<p><a href=\"https:\/\/wiki.scn.sap.com\/\" target=\"_blank\" rel=\"noopener\">https:\/\/wiki.scn.sap.com\/<\/a><\/p>\n<p><a href=\"https:\/\/launchpad.support.sap.com\/#\/securitynotes\" target=\"_blank\" rel=\"noopener\">https:\/\/launchpad.support.sap.com\/#\/securitynotes<\/a><\/p>\n<p><a href=\"https:\/\/www.sap.com\/documents\/2022\/02\/fa865ea4-167e-0010-bca6-c68f7e60039b.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.sap.com\/documents\/2022\/02\/fa865ea4-167e-0010-bca6-c68f7e60039b.html<\/a><\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener\">https:\/\/cve.mitre.org\/<\/a><\/p>\n<p>Art\u00edculos anteriores de este mismo a\u00f1o 2022:<\/p>\n<p><a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-junio\/\">JUNIO 2022<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-mayo\/\" target=\"_blank\" rel=\"noreferrer noopener\">MAYO 2022<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-abril\/\" target=\"_blank\" rel=\"noreferrer noopener\">ABRIL 2022<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-marzo\/\" target=\"_blank\" rel=\"noreferrer noopener\">MARZO 2022<\/a>\u00a0\u2013\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-febrero\/\" target=\"_blank\" rel=\"noreferrer noopener\">FEBRERO 2022<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;M\u00e1s informaci\u00f3n&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"morado\">M\u00e1s informaci\u00f3n:<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/orekait.com\/es\/area-administracion-sistemas&#8221; button_text=&#8221;M\u00e1s informaci\u00f3n&#8221; module_class=&#8221;entrada-btn&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#8156EA&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_color=&#8221;#8156EA&#8221; button_border_radius=&#8221;30px&#8221; button_font=&#8221;Plus Jakarta Sans|600|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#8156EA&#8221; button_on_hover=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#8156EA&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#8156EA&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_icon_color__hover_enabled=&#8221;on|hover&#8221; button_icon_color__hover=&#8221;#ffffff&#8221; url_new_window=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; admin_label=&#8221;Noticias relacionadas titulo&#8221; module_id=&#8221;fondo-articulos&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_heading title=&#8221;Quizas te pueda interesar&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Noticias relacionadas&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;-150px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;current&#8221; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Retomamos el an\u00e1lisis de las notas de seguridad publicadas por SAP en el security patch day. Ya que desde Oreka IT seguimos considerando importante continuar con la divulgaci\u00f3n de estas\u00a0actualizaciones\u00a0porque es la mejor forma de explicar la criticidad de mantener actualizadas las aplicaciones corporativas. Comenzando con el an\u00e1lisis cuantitativo, en esta nueva publicaci\u00f3n del security [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":4942,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Lorem ipsum dolor sit amet consectetur adipiscing elit congue montes, imperdiet taciti erat elementum fermentum sem ante ultrices ridiculus, sagittis sociis egestas quisque ac semper quis odio. Aenean hendrerit ac metus dis nascetur aliquet mollis integer, rutrum vel laoreet posuere proin sagittis luctus est, tempus duis nisl ultrices parturient tempor praesent. Dignissim curabitur nascetur pellentesque augue fringilla pulvinar eros, tempus fames vehicula maecenas cubilia id, rutrum euismod integer ut scelerisque mus.\r\n\r\nVivamus auctor odio aenean rhoncus natoque dictum purus, volutpat pellentesque laoreet ridiculus consequat nisi varius euismod, augue platea convallis curae magnis taciti. Imperdiet nibh curabitur quisque orci consequat aenean pellentesque, cubilia duis senectus felis sed posuere tortor, magnis enim diam a odio sociis. Enim tellus nisl nec molestie augue luctus tempor habitant, nunc dictumst phasellus volutpat sem facilisis taciti, habitasse laoreet at turpis vel fermentum vulputate.","_et_gb_content_width":"","footnotes":""},"categories":[48,50],"tags":[],"class_list":["post-4940","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-administracion-de-sistemas","category-sap-security-patch-day"],"_links":{"self":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/4940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/comments?post=4940"}],"version-history":[{"count":6,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/4940\/revisions"}],"predecessor-version":[{"id":21143,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/4940\/revisions\/21143"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media\/4942"}],"wp:attachment":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media?parent=4940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/categories?post=4940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/tags?post=4940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}