Security
Headlines
HeadlinesLatestCVEs

Headline

GHSA-6mjg-37cp-42x5: Improper Privilege Management in sap-xssec

Impact

SAP BTP Security Services Integration Library ([Python] sap-xssec) allows under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.

Patches

Upgrade to patched version >= 4.1.0 We always recommend to upgrade to the latest released version.

Workarounds

No workarounds

References

https://www.cve.org/CVERecord?id=CVE-2023-50423

ghsa
#xss#vulnerability#git#auth#sap

Skip to content

    • Actions

      Automate any workflow

    • Packages

      Host and manage packages

    • Security

      Find and fix vulnerabilities

    • Codespaces

      Instant dev environments

    • Copilot

      Write better code with AI

    • Code review

      Manage code changes

    • Issues

      Plan and track work

    • Discussions

      Collaborate outside of code

    • GitHub Sponsors

      Fund open source developers

*   The ReadME Project
    
    GitHub community articles
  • Pricing
  1. GitHub Advisory Database
  2. GitHub Reviewed
  3. GHSA-6mjg-37cp-42x5

Improper Privilege Management in sap-xssec

Critical severity GitHub Reviewed Published Dec 12, 2023 in SAP/cloud-pysec • Updated Dec 13, 2023

Package

pip sap-xssec (pip)

Affected versions

< 4.1.0

Description

Impact

SAP BTP Security Services Integration Library ([Python] sap-xssec) allows under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.

Patches

Upgrade to patched version >= 4.1.0
We always recommend to upgrade to the latest released version.

Workarounds

No workarounds

References

https://www.cve.org/CVERecord?id=CVE-2023-50423

References

  • GHSA-6mjg-37cp-42x5
  • SAP/cloud-pysec@d90c9e0

Published to the GitHub Advisory Database

Dec 13, 2023

Last updated

Dec 13, 2023

ghsa: Latest News

GHSA-w7qr-q9fh-fj35: Dozzle uses unsafe hash for passwords