exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

SAP Security Notes August 2015

SAP Security Notes August 2015
Posted Aug 13, 2015
Authored by Dmitry Chastuhin, Vahagn Vardanyan, Roman Bejan

SAP has released the monthly critical patch update for August 2015. This patch update closes 22 vulnerabilities in SAP products, 15 have high priority, some of them belong to the SAP HANA security area. The most popular vulnerability is cross site scripting.

tags | advisory, vulnerability, xss
SHA-256 | ee31bc13be4242371858e63b399fe7e6e376803421f553b15b566f75b404d801

SAP Security Notes August 2015

Change Mirror Download
SAP <http://www.sap.com/> has released
<http://scn.sap.com/community/security/blog/2015/08/11/sap-security-patch-day-summary--august-2015>the
monthly critical patch update for August 2015. This patch update closes 22
vulnerabilities in SAP products, 15 have high priority, some of them belong
to the SAP HANA security area. The most popular vulnerability is Cross Site
Scripting (XSS). This month, three critical vulnerabilities found by
ERPScan researchers Dmitry Chastuhin, Vahagn Vardanyan, Roman Bejan were
closed.


*Issues that were patched with the help of ERPScan*


Below are the details of SAP vulnerabilities that were found by ERPScan
<http://www.erpscan.com/> researchers.



- An XML eXternal Entity vulnerability in SAP Mobile Platform 2.3 (CVSS
Base Score: 4.9). Update is available in SAP Security Note 2152227
<https://service.sap.com/sap/support/notes/2152227>. An attacker can use
XML eXternal Entities to send specially crafted unauthorized XML requests,
which will be processed by the XML parser. The attacker will get
unauthorized access to the OS file system.
- An XML eXternal Entity vulnerability in SAP NetWeaver Portal (CVSS
Base Score: 4.9). Update is available in SAP Security Note 2168485
<https://service.sap.com/sap/support/notes/2168485>. An attacker can use
XML eXternal Entities to send specially crafted unauthorized XML requests,
which will be processed by the XML parser. The attacker will get
unauthorized access to the OS file system.
- An XSS vulnerability in SAP Afaria 7 (CVSS Base Score: 4.3). Update is
available in SAP Security Note 2152669
<https://service.sap.com/sap/support/notes/2152669>. An attacker can
modify displayed application content without authorization and steal
authentication data (cookie).


*The most critical issues found by other researchers*


Some of our readers and clients asked us to categorize the most critical
SAP vulnerabilities to patch them first. Companies providing SAP Security
Audit, SAP Security Assessment, or SAP Penetration Testing services can
include these vulnerabilities in their checklists. The most critical
vulnerabilities of this update can be patched by the following SAP Security
Notes:



- 2037304: <https://service.sap.com/sap/support/notes/2037304> SAP ST-P
has a Remote Command Execution vulnerability (CVSS Base Score: 8.5). An
attacker can use Remote Command Execution to run commands remotely.
Executed commands will run with the privileges of the service that executes
them. An attacker can access arbitrary files and directories located in an
SAP server filesystem, including application source code, configuration,
and critical system files. It allows obtaining critical technical and
business-related information stored in the vulnerable SAP system. It is
recommended to install this SAP Security Note to prevent risks.
- 2169391 <https://service.sap.com/sap/support/notes/2169391>: SAP
NetWeaver AFP Servlet has a Reflected File Download vulnerability (CVSS
Base Score: 7.5). Reflected File Download (RFD) is a web attack vector
that enables attackers to gain complete control over a victim's machine. In
an RFD attack, the user follows a malicious link to a trusted domain
resulting in a file download from that domain. It is recommended to install
this SAP Security Note to prevent risks.
- 2175928 <https://service.sap.com/sap/support/notes/2175928>: SAP HANA
has a Running Process Remote Termination vulnerability (CVSS Base Score:
6.8). An attacker can use this vulnerability to terminate the process of
a vulnerable component. Nobody will be able to use this service, which has
a negative impact on business processes, system downtime, and business
reputation. It is recommended to install this SAP Security Note to prevent
risks.
- 2165583 <https://service.sap.com/sap/support/notes/2165583>: SAP HANA
has an incorrect system configuration vulnerability (CVSS Base Score: 6.6).
SAP HANA internal services could be accessed without authentication if the
HANA system is insecurely configured and no other security measures are in
place. This could endanger system availability, data confidentiality and
integrity. It is recommended to install this SAP Security Note to prevent
risks.


It is highly recommended to patch all those SAP vulnerabilities to prevent
business risks affecting your SAP systems.


SAP has traditionally thanked the security researchers from ERPScan for
found vulnerabilities on their acknowledgment page
<http://scn.sap.com/docs/DOC-8218>.
Login or Register to add favorites

File Archive:

February 2023

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    11 Files
  • 2
    Feb 2nd
    9 Files
  • 3
    Feb 3rd
    0 Files
  • 4
    Feb 4th
    0 Files
  • 5
    Feb 5th
    0 Files
  • 6
    Feb 6th
    0 Files
  • 7
    Feb 7th
    0 Files
  • 8
    Feb 8th
    0 Files
  • 9
    Feb 9th
    0 Files
  • 10
    Feb 10th
    0 Files
  • 11
    Feb 11th
    0 Files
  • 12
    Feb 12th
    0 Files
  • 13
    Feb 13th
    0 Files
  • 14
    Feb 14th
    0 Files
  • 15
    Feb 15th
    0 Files
  • 16
    Feb 16th
    0 Files
  • 17
    Feb 17th
    0 Files
  • 18
    Feb 18th
    0 Files
  • 19
    Feb 19th
    0 Files
  • 20
    Feb 20th
    0 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Hosting By
Rokasec
close