Vulnerability Description
On versions of Sage 300 2017 - 2022 (6.4.x - 6.9.x) which are setup in a "Windows Peer-to-Peer Network" or "Client Server Network" configuration, a low-privileged Sage 300 workstation user could abuse their access to the "SharedData" folder on the connected Sage 300 server to view and/or modify the credentials associated with Sage 300 users and SQL accounts to impersonate users and/or access the SQL database as a system administrator. With system administrator-level access to the Sage 300 MS SQL database it would be possible to create, update, and delete all records associated with the program and, depending on the configuration, execute code on the underlying database server.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sage | Sage 300 | >= 2017, <= 2022 |
Related Weaknesses (CWE)
References
- http://sage.comVendor Advisory
- https://www.controlgap.com/blog/sage-300-case-studyExploitThird Party Advisory
- http://sage.comVendor Advisory
- https://www.controlgap.com/blog/sage-300-case-studyExploitThird Party Advisory
FAQ
What is CVE-2022-38583?
CVE-2022-38583 is a vulnerability with a CVSS score of 7.8 (HIGH). On versions of Sage 300 2017 - 2022 (6.4.x - 6.9.x) which are setup in a "Windows Peer-to-Peer Network" or "Client Server Network" configuration, a low-privileged Sage 300 workstation user could abuse...
How severe is CVE-2022-38583?
CVE-2022-38583 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-38583?
Check the references section above for vendor advisories and patch information. Affected products include: Sage Sage 300.