{"id":5888,"date":"2022-05-13T08:00:31","date_gmt":"2022-05-13T06:00:31","guid":{"rendered":"http:\/\/192.168.20.3\/?p=5888"},"modified":"2024-12-10T15:11:02","modified_gmt":"2024-12-10T14:11:02","slug":"sap-security-patch-day-mayo-2022","status":"publish","type":"post","link":"https:\/\/orekait.com\/es\/sap-security-patch-day-mayo-2022\/","title":{"rendered":"SAP Security Patch Day<br> <span class=\"font-300\">Mayo 2022<\/span>"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;Imagen principal&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\/orekait.com\/wp-content\/uploads\/2022\/05\/Firma-2-1-2.png&#8221; alt=&#8221;cloud-public&#8221; title_text=&#8221;Firma-2-1-2&#8243; admin_label=&#8221;Imagen principal&#8221; module_class=&#8221;post-img&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Cuerpo&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Texto&#8221; _builder_version=&#8221;4.25.2&#8243; header_2_font_size=&#8221;24px&#8221; header_3_font_size=&#8221;20px&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; content__hover_enabled=&#8221;off|desktop&#8221; sticky_enabled=&#8221;0&#8243;]<\/p>\n<div class=\"et_pb_row et_pb_row_0\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>Continuando con nuestro esfuerzo por contar de una manera m\u00e1s cercana las \u00faltimas novedades en materia de seguridad de SAP, os traemos la \u00faltima publicaci\u00f3n del security patch day de mayo. Este mes SAP ha continuado trabajando en la ya famosa vulnerabilidad\u00a0<strong>spring4shell<\/strong>\u00a0detectada recientemente y de la que tambi\u00e9n estuvimos hablando la\u00a0<a href=\"https:\/\/orekait.com\/blog\/sap-security-patch-day-abril\/\">publicaci\u00f3n de abril.<\/a><\/p>\n<p>En cuanto al an\u00e1lisis cuantitativo de las notas publicadas, en esta ocasi\u00f3n SAP ha publicado 14 notas de seguridad de las cuales 6 son de importancia high o hot news, con una puntuaci\u00f3n CVSS superior a 7. De las cuales 4 son actualizaciones de notas de seguridad ya publicadas.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"et_pb_row et_pb_row_1\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>A continuaci\u00f3n, analizaremos estas 6 notas:<\/strong><\/p>\n<p><strong>[CVE-2022-22965]Central Security Note for Remote Code Execution vulnerability associated with Spring Framework.<\/strong><\/p>\n<p>La nota\u00a0<strong>3170990<\/strong>\u00a0es la nota central que recopila todas las notas que SAP ha publicado relacionadas con la vulnerabilidad conocida como\u00a0<strong>spring4shell,\u00a0<\/strong>valorada con una puntuaci\u00f3n\u00a0<strong>CVE de 9.8<\/strong>, esta vulnerabilidad es de tipo RCE ya que en caso de ser explotada permite la ejecuci\u00f3n de c\u00f3digo remoto en nuestros sistemas.<\/p>\n<p>Es importante revisar si nuestros sistemas se han visto afectados y actualizarlos con las nuevas versiones de software que resuelven esta vulnerabilidad.<\/p>\n<p>En caso de darse las siguientes condiciones en nuestros sistemas, deberemos considerarlos vulnerables frente a la ejecuci\u00f3n de c\u00f3digo remoto:<\/p>\n<ul>\n<li>Aplicaci\u00f3n Spring MVC o Spring WebFlux ejcut\u00e1ndose en JDK9+<\/li>\n<li>Apache Tomcat como contenedor de servlets<\/li>\n<li>Aplicaci\u00f3n ejecut\u00e1ndose en Tomcat c\u00f3mo desarrollo WAR, aunque por la naturaleza de la vulnerabilidad tambi\u00e9n podr\u00eda afectar a los desarrollos jar<\/li>\n<\/ul>\n<p>Asociadas a esta vulnerabilidad encontramos las siguientes notas, tratando cada una de ellas la vulnerabilidad en un producto SAP:<\/p>\n<ul>\n<li><strong>3170990:<\/strong>\u00a0Nota central que recopila todas las notas con todas las actualizaciones e informaci\u00f3n desarrollada por SAP para resolver la vulnerabilidad spring4shell.<\/li>\n<li><strong>3189635:<\/strong>\u00a0Trata la vulnerabilidad spring4shell aplicada a Customer Profitability Analytics, indica la versi\u00f3n de producto a la que debemos actualizar.<\/li>\n<li><strong>3171258:\u00a0<\/strong>Trata la vulnerabilidad spring4shell aplicada a SAP Commerce, indicando para cada caso las versiones a las que debemos actualizar.<\/li>\n<li><strong>3189409:\u00a0<\/strong>Trata la vulnerabilidad spring4shell aplicada a SAP Business One Cloud.<\/li>\n<\/ul>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>[CVE-2022-27656] Cross-Site Scripting (XSS) vulnerability in administration UI of SAP Webdispatcher and SAP Netweaver AS for ABAP and Java (ICM).<\/strong><\/p>\n<p>Vulnerabilidad de cross-site scripting (XSS) en la administraci\u00f3n web del ICM en SAP Webdispatcher y SAP netweaver AS ABAP y JAVA. La nota 3145046 recopila toda la informaci\u00f3n proporcionada por SAP para resolver o mitigar esta vulnerabilidad.<\/p>\n<p>Esta vulnerabilidad afecta en el caso de usar un acceso autenticado a la interfaz web del ICM de uno de los productos afectados.<\/p>\n<p>SAP nos plantea una soluci\u00f3n, basada en aplicar un SP stack kernel adem\u00e1s de actualizar con las \u00faltimas versiones de los ficheros SAPWEBDISP.SAR y dw.sar que resuelven esta vulnerabilidad. Aunque por otra parte, si queremos disponer de una mitigaci\u00f3n m\u00e1s inmediata nos proporciona hasta 3 workarounds diferentes para prevenir esta vulnerabilidad.<\/p>\n<p>Como es habitual, en cualquier caso, SAP nos recomienda aplicar su soluci\u00f3n a pesar de que hallamos aplicado alguno de los workaround propuestos.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>[CVE-2022-28214] Central Management Server Information Disclosure in Business Intelligence Update.<\/strong><\/p>\n<p>La nota 2998510 trata esta vulnerabilidad que se da durante la actualizaci\u00f3n de SAP Business Enterprise Central Management Server (CMS), ya que las credenciales son mostradas en el log de eventos sysmon. Esta fuga de informaci\u00f3n puede comprometer la confidencialidad, integridad y disponibilidad del sistema.<\/p>\n<p>En este momento SAP no dispone de una soluci\u00f3n, pero ser\u00e1 publicada en la nota 2998510, y listada en el apartado de descargas \u00abSupport Packages &amp; Patches\u00bb correspondiente.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"et_pb_row et_pb_row_2\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>En el siguiente cuadro, todas las notas liberadas este mes para comprobar si aplican o no en vuestros sistemas:<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"et_pb_row et_pb_row_3\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<table border=\"1\">\n<tbody>\n<tr>\n<td>Note#<\/td>\n<td>Title<\/td>\n<td>Priority<\/td>\n<td>CVSS<\/td>\n<\/tr>\n<tr>\n<td>3170990<\/td>\n<td class=\"xl6823163\" width=\"910\">[Update] [CVE-2022-22965] Central Security Note for Remote Code Execution vulnerability associated with Spring Framework<\/td>\n<td>Hot News<\/td>\n<td>9.8<\/td>\n<\/tr>\n<tr>\n<td>3189409<\/td>\n<td>[CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Business One Cloud<\/td>\n<td>Hot News<\/td>\n<td>9.8<\/td>\n<\/tr>\n<tr>\n<td>3171258<\/td>\n<td>[CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Commerce<\/td>\n<td>Hot News<\/td>\n<td>9.8<\/td>\n<\/tr>\n<tr>\n<td>3189635<\/td>\n<td>[CVE-2022-22965] Remote Code Execution vulnerability associated with Spring Framework used in SAP Customer Profitability Analytics<\/td>\n<td>Hot News<\/td>\n<td>9.8<\/td>\n<\/tr>\n<tr>\n<td>3145046<\/td>\n<td class=\"xl6823163\" width=\"910\">[CVE-2022-27656] Cross-Site Scripting (XSS) vulnerability in administration UI of SAP Webdispatcher and SAP Netweaver AS for ABAP and Java (ICM)<\/td>\n<td>High<\/td>\n<td>8.3<\/td>\n<\/tr>\n<tr>\n<td>2998510<\/td>\n<td>[CVE-2022-28214] Central Management Server Information Disclosure in Business Intelligence Update<\/td>\n<td>High<\/td>\n<td>7.8<\/td>\n<\/tr>\n<tr>\n<td>3137191<\/td>\n<td>[Update] [CVE-2022-22541] Information Disclosure vulnerability in SAP BusinessObjects Platform<\/td>\n<td>Medium<\/td>\n<td>6.8<\/td>\n<\/tr>\n<tr>\n<td>3165801<\/td>\n<td>[CVE-2022-29611] Missing Authorization check in SAP NetWeaver Application Server for ABAP and ABAP Platform<\/td>\n<td>Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td>3164677<\/td>\n<td>[CVE-2022-29613] Information Disclosure vulnerability in SAP Employee Self Service(Fiori My Leave Request)<\/td>\n<td>Medium<\/td>\n<td>6.5<\/td>\n<\/tr>\n<tr>\n<td>3146336<\/td>\n<td>[CVE-2022-29610] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Application Server ABAP<\/td>\n<td>Medium<\/td>\n<td>5.4<\/td>\n<\/tr>\n<tr>\n<td>3158188<\/td>\n<td class=\"xl6823163\" width=\"910\">[CVE-2022-28774] Information Disclosure vulnerability in SAP Host Agent logfile<\/td>\n<td>Medium<\/td>\n<td>5.3<\/td>\n<\/tr>\n<tr>\n<td>3145702<\/td>\n<td>[CVE-2022-29616] Memory Corruption vulnerability in SAP Host Agent, SAP NetWeaver and ABAP Platform<\/td>\n<td>Medium<\/td>\n<td>5.3<\/td>\n<\/tr>\n<tr>\n<td>3124994<\/td>\n<td>[Update] [CVE-2022-22534] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver<\/td>\n<td>Medium<\/td>\n<td>4.7<\/td>\n<\/tr>\n<tr>\n<td>3165333<\/td>\n<td>[Update] [CVE-2022-28215] URL Redirection vulnerability in SAP NetWeaver ABAP Server and ABAP Platform<\/td>\n<td>Medium<\/td>\n<td>4.7<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"et_pb_row et_pb_row_4\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>Este mes SAP ha liberado 33 notas de seguridad de las cuales 7 tienen una puntuaci\u00f3n CVSS por encima de 9.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<table border=\"1\">\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td>LOW<\/td>\n<td>MEDIUM<\/td>\n<td>HIGH<\/td>\n<td>HOT NEWS<\/td>\n<td>TOTAL<\/td>\n<\/tr>\n<tr>\n<td>Enero<\/td>\n<td>1<\/td>\n<td>5<\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td>9<\/td>\n<\/tr>\n<tr>\n<td>Febrero<\/td>\n<td>1<\/td>\n<td>6<\/td>\n<td>3<\/td>\n<td>9<\/td>\n<td>19<\/td>\n<\/tr>\n<tr>\n<td>Marzo<\/td>\n<td>1<\/td>\n<td>10<\/td>\n<td>1<\/td>\n<td>4<\/td>\n<td>16<\/td>\n<\/tr>\n<tr>\n<td>Abril<\/td>\n<td>2<\/td>\n<td>17<\/td>\n<td>7<\/td>\n<td>7<\/td>\n<td>33<\/td>\n<\/tr>\n<tr>\n<td>Mayo<\/td>\n<td>\u00a0<\/td>\n<td>8<\/td>\n<td>2<\/td>\n<td>4<\/td>\n<td>14<\/td>\n<\/tr>\n<tr>\n<td>TOTAL<\/td>\n<td>5<\/td>\n<td>46<\/td>\n<td>15<\/td>\n<td>25<\/td>\n<td>91<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"et_pb_row et_pb_row_5\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p><strong>El desglose de vulnerabilidades encontradas en los sistemas SAP ha sido el siguiente:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<table border=\"1\">\n<tbody>\n<tr>\n<td>\u00a0<\/td>\n<td>Enero<\/td>\n<td>Febrero<\/td>\n<td>Marzo<\/td>\n<td>Abril<\/td>\n<td>Mayo<\/td>\n<td>TOTAL<\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Clickjacking<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td>Code Injection<\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>3<\/td>\n<td>\u00a0<\/td>\n<td><strong>6<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Cross-Site Scripting<\/td>\n<td>2<\/td>\n<td>2<\/td>\n<td>4<\/td>\n<td>4<\/td>\n<td>3<\/td>\n<td><strong>15<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Denial of Service<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>2<\/td>\n<td>4<\/td>\n<td>\u00a0<\/td>\n<td><strong>7<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Improper authentication<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Improper input validation<\/td>\n<td>2<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td><strong>4<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Information Disclosure<\/td>\n<td>4<\/td>\n<td>2<\/td>\n<td>4<\/td>\n<td>6<\/td>\n<td>4<\/td>\n<td><strong>20<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Memory corruption<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td><strong>2<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Missing Authorization Check<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td>5<\/td>\n<td>1<\/td>\n<td>1<\/td>\n<td><strong>9<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Missing input Validation<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Missing XML Validation<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>3<\/td>\n<td>\u00a0<\/td>\n<td><strong>3<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Remote Code Execution<\/td>\n<td>1<\/td>\n<td>7<\/td>\n<td>1<\/td>\n<td>6<\/td>\n<td>4<\/td>\n<td><strong>19<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Server Side Request Forgery<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"211\">SQL Injection<\/td>\n<td>\u00a0<\/td>\n<td>1<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td>\u00a0<\/td>\n<td><strong>1<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"211\">Otros<\/td>\n<td>\u00a0<\/td>\n<td>2<\/td>\n<td>\u00a0<\/td>\n<td>6<\/td>\n<td>1<\/td>\n<td><strong>9<\/strong><\/td>\n<\/tr>\n<tr>\n<td>\u00a0<\/td>\n<td><strong>12<\/strong><\/td>\n<td><strong>19<\/strong><\/td>\n<td><strong>16<\/strong><\/td>\n<td><strong>36<\/strong><\/td>\n<td><strong>14<\/strong><\/td>\n<td><strong>83<\/strong><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"et_pb_row et_pb_row_6\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<p>La diferencia de notas liberadas y vulnerabilidades es debido a que una nota puede solucionar m\u00faltiples vulnerabilidades.<\/p>\n<p>Nos despedimos recomendando pasarse por el apartado de security notes del Launchpad de SAP y analizar las notas liberadas desde la \u00faltima actualizaci\u00f3n de nuestros sistemas e instalar las que apliquen a los sistemas de cada empresa.<\/p>\n<p><strong>Fuentes:<\/strong><\/p>\n<p><a href=\"https:\/\/wiki.scn.sap.com\/\" target=\"_blank\" rel=\"noopener\"><strong>https:\/\/wiki.scn.sap.com\/<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/\" target=\"_blank\" rel=\"noopener\"><strong>https:\/\/cve.mitre.org\/<\/strong><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;M\u00e1s informaci\u00f3n&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"morado\">M\u00e1s informaci\u00f3n:<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8221;https:\/\/orekait.com\/es\/area-administracion-sistemas&#8221; button_text=&#8221;M\u00e1s informaci\u00f3n&#8221; module_class=&#8221;entrada-btn&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_button=&#8221;on&#8221; button_text_color=&#8221;#8156EA&#8221; button_bg_color=&#8221;RGBA(255,255,255,0)&#8221; button_border_color=&#8221;#8156EA&#8221; button_border_radius=&#8221;30px&#8221; button_font=&#8221;Plus Jakarta Sans|600|||||||&#8221; button_icon=&#8221;&#x24;||divi||400&#8243; button_icon_color=&#8221;#8156EA&#8221; button_on_hover=&#8221;off&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; button_text_color__hover_enabled=&#8221;on|desktop&#8221; button_text_color__hover=&#8221;#8156EA&#8221; button_bg_color__hover_enabled=&#8221;on|hover&#8221; button_bg_color__hover=&#8221;#8156EA&#8221; button_bg_enable_color__hover=&#8221;on&#8221; button_icon_color__hover_enabled=&#8221;on|hover&#8221; button_icon_color__hover=&#8221;#ffffff&#8221; url_new_window=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row use_custom_gutter=&#8221;on&#8221; admin_label=&#8221;Noticias relacionadas titulo&#8221; module_id=&#8221;fondo-articulos&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f7f7f7&#8243; width=&#8221;100%&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;RGBA(255,255,255,0)&#8221; custom_margin=&#8221;||40px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_heading title=&#8221;Quizas te pueda interesar&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; title_level=&#8221;h2&#8243; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][et_pb_divider show_divider=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;||30px||false|false&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row admin_label=&#8221;Noticias relacionadas&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; width=&#8221;100%&#8221; custom_margin=&#8221;-150px||||false|false&#8221; custom_margin_tablet=&#8221;0px||||false|false&#8221; custom_margin_phone=&#8221;0px||||false|false&#8221; custom_margin_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; posts_number=&#8221;3&#8243; include_categories=&#8221;current&#8221; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.25.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Continuando con nuestro esfuerzo por contar de una manera m\u00e1s cercana las \u00faltimas novedades en materia de seguridad de SAP, os traemos la \u00faltima publicaci\u00f3n del security patch day de mayo. Este mes SAP ha continuado trabajando en la ya famosa vulnerabilidad\u00a0spring4shell\u00a0detectada recientemente y de la que tambi\u00e9n estuvimos hablando la\u00a0publicaci\u00f3n de abril. En cuanto [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":5890,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Lorem ipsum dolor sit amet consectetur adipiscing elit congue montes, imperdiet taciti erat elementum fermentum sem ante ultrices ridiculus, sagittis sociis egestas quisque ac semper quis odio. Aenean hendrerit ac metus dis nascetur aliquet mollis integer, rutrum vel laoreet posuere proin sagittis luctus est, tempus duis nisl ultrices parturient tempor praesent. Dignissim curabitur nascetur pellentesque augue fringilla pulvinar eros, tempus fames vehicula maecenas cubilia id, rutrum euismod integer ut scelerisque mus.\r\n\r\nVivamus auctor odio aenean rhoncus natoque dictum purus, volutpat pellentesque laoreet ridiculus consequat nisi varius euismod, augue platea convallis curae magnis taciti. Imperdiet nibh curabitur quisque orci consequat aenean pellentesque, cubilia duis senectus felis sed posuere tortor, magnis enim diam a odio sociis. Enim tellus nisl nec molestie augue luctus tempor habitant, nunc dictumst phasellus volutpat sem facilisis taciti, habitasse laoreet at turpis vel fermentum vulputate.","_et_gb_content_width":"","footnotes":""},"categories":[48,49,50],"tags":[],"class_list":["post-5888","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-administracion-de-sistemas","category-sap-security","category-sap-security-patch-day"],"_links":{"self":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/5888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/comments?post=5888"}],"version-history":[{"count":5,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/5888\/revisions"}],"predecessor-version":[{"id":21237,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/posts\/5888\/revisions\/21237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media\/5890"}],"wp:attachment":[{"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/media?parent=5888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/categories?post=5888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/orekait.com\/es\/wp-json\/wp\/v2\/tags?post=5888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}