{"uuid": "12ad6ac9-7685-4109-bb5e-7bdb66f3f792", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-25617", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/5738", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-25617\n\ud83d\udd25 CVSS Score: 9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: SAP Business Object (Adaptive Job Server) - versions 420, 430, allows remote execution of arbitrary commands on Unix, when program objects execution is enabled, to authenticated users with scheduling rights, using the BI Launchpad, Central Management Console or a custom application based on the public java SDK. Programs could impact the confidentiality, integrity and availability of the system.\n\n\n\ud83d\udccf Published: 2023-03-14T04:42:40.759Z\n\ud83d\udccf Modified: 2025-02-27T18:07:16.954Z\n\ud83d\udd17 References:\n1. https://launchpad.support.sap.com/#/notes/3283438\n2. https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", "creation_timestamp": "2025-02-27T18:26:56.000000Z"}