KEMBAR78
SAP Patch Update: Critical Fixes | PDF | Vulnerability (Computing) | Sap Se
0% found this document useful (2 votes)
265 views4 pages

SAP Patch Update: Critical Fixes

SAP released 16 new security notes in February 2019 to address vulnerabilities in their software. Several of the vulnerabilities were reported by Onapsis Research Labs, including: 1) A high priority vulnerability in SLDREG that could allow files to be read on SAP systems. 2) Two medium priority vulnerabilities affecting SAP Business One mobile apps and SAP BusinessObjects. 3) An updated security note addressing vulnerabilities in SAP software component ST-PI reported by Onapsis in 2014.

Uploaded by

Prasl tgk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (2 votes)
265 views4 pages

SAP Patch Update: Critical Fixes

SAP released 16 new security notes in February 2019 to address vulnerabilities in their software. Several of the vulnerabilities were reported by Onapsis Research Labs, including: 1) A high priority vulnerability in SLDREG that could allow files to be read on SAP systems. 2) Two medium priority vulnerabilities affecting SAP Business One mobile apps and SAP BusinessObjects. 3) An updated security note addressing vulnerabilities in SAP software component ST-PI reported by Onapsis in 2014.

Uploaded by

Prasl tgk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

SAP Security Notes February ‘19: Several

Critical Onapsis Reported Bugs Patched


By Daniel Antonelli, Matias Sena, Sebastian Bortnik SAP Security Notes SAP Security Notes,
SAP, sap erp, information security 0 Comments
Share

It’s the second Tuesday of the month and, guess what, SAP has released the second set of
Security Notes for the year. As with every month, we have provided an analysis of this month’s
Patch Day. Today, SAP published 16 new SAP Security Notes, including one that is the first
HotNews affecting SAP HANA XSA (extended application services, advanced model). Also
included are four other vulnerabilities reported by the Onapsis Research Labs:

• One High Priority note affecting SLDREG component, present in several products
• Two of four Onapsis reported notes represent half of the four vulnerabilities with the
highest CVSS score
• One of these two is an update for a previously published note based off an Onapsis report
• Another two vulnerabilities, both tagged as Medium Priority, affect another mobile
platform (as we reported last month) and SAP BusinessObjects, where we have helped
SAP patch another four bugs (in three SAP Security Notes) in the last year

As mentioned, one of the two SAP Security Notes tagged as HotNews (#2742027) affects SAP
HANA XSA (the other one is #2622660 that is regularly updated with Chromium security
updates and was explained in a previous blog post). It is a classic Missing Authorization Check
that may allow an attacker not only to read/modify/delete sensitive information, but also to gain
high-privileged functionalities. It affects XS Advanced selected versions in both SAP HANA 1
and SAP HANA 2 and can be patched by upgrading the XS Advanced component. If XSA
cannot be updated in the short term, SAP also details a workaround to avoid further attacks, by
disabling the affected component if it’s not used (check SAP Launchpad for details).

SAP Updates High Priority Note Based on Onapsis Reports


SAP Security Note #2070691 was first released in 2014 and this month was re-released thanks to
the collaborative effort of our researchers and SAP. This note, tagged with CVSS v3.0 Base
Score 7.7/10 patches two functions that could lead an attacker to get information stored in files
on the operating system level on the database server.
The previous version of this note affected ABAP systems that have installed the software
component ST-PI, which is an add-on that contains the Service Data Control Center (SDCCN),
with Support Package (SP) 0. If you had tried to install it having SP higher than 0, you would
have seen that the note was shown as Cannot be implemented in the SNOTE transaction code:

XXE in SLDREG Affecting Several Products


SAP Security Note #2729710, tagged as High Priority, fixes a serious vulnerability reported by
the Onapsis Research Labs. The security bug, titled "XML External Entity (XXE)
vulnerability in SLD Registration of ABAP Platform,” was found during our research. The
vulnerability affects a kernel component present in every SAP system.

SLD Registration (SLDREG) is a binary which is used for sending information on the SAP
system to the configured Solution Manager (SOLMAN). It is stored in the Operating System
(OS) and researchers discovered that it can be remotely executed. The importance of this bug is
that, the SLDREG binary is present in every SAP platform, such as ABAP, JAVA, etc.
Therefore, there may be other places to successfully exploit it than the one discovered by
Onapsis researchers.

Although this endpoint needs the credentials of the lm_service user, a user with access to them
will be able to use this service. By abusing this vulnerability an attacker would be able to
send a specially crafted XML payload.

The reason why this vulnerability is critical is because an attacker may compromise the system
and read any file of the OS (i.e. content of the file /etc/passwd) as well as perform a Denial of
Service (DoS) against the SAP system.

The vulnerability was fixed by the vendor and published with a high CVSS v3.0 Base Score
8.6/10. The impact of this security bug is high in the security values for Confidentiality and,
what's more, Availability. The latter is affected because, although the vulnerability seems to only
allow files to be read, something worthy of attention is that the XML External Entity (XXE)
vulnerability, in general, contains something called an XML Entity Bomb. This attack is a piece
of XML code, syntactically valid and correct, that could store entries to references which refer to
other references (generating a loop) and that nested data entities start growing exponentially and
can result in a DoS.

This bug, found by Onapsis researchers Pablo Artuso & Nahuel D. Sanchez, is part of their
presentation next March, in Germany, at the upcoming Troopers Conference. They will provide a
talk titled, “Dark Clouds ahead: Attacking a Cloud Foundry Implementation,” showing how
through combining several vulnerabilities, even ones that are not tagged as HotNews, attackers
can get critical access to the system.

However, the Onapsis Research Labs has found that the bug was also present in systems with
higher SP. In fact, systems with ST-PI with SP lower than 11 are vulnerable to this information
disclosure. Therefore, SAP released today an updated version of this note offering the patch for
all the vulnerable versions. Now, to patch your system you could enter that note in the Note
Assistant, click on the 'Download Latest Version of SAP Note' icon and it will appear as Can be
implemented. Then, you implement the note and problem solved!

Other Notes Reported by Onapsis Research Labs Affecting


SAP Business One and SAP BusinessObjects
As mentioned before, there are two vulnerabilities that were reported by our researchers and
properly fixed this month, both of them tagged as Medium Priority and with CVSS v3.0 Base
Score of 6.1/10.

The first one is another patch based on Yvan Genuer's research on SAP Mobile Applications,
that lead to the first patches released last month. Today, SAP Security Note #2723878 solves an
Information Disclosure in SAP Business One Mobile app for Android. The bug affects only
Android applications and can be solved by upgrading to latest version through Google Play.

The last note reported by the Onapsis Research Labs is a finding by Gaston Traberg, who has
discovered several vulnerabilities in SAP BusinessObjects. This one, SAP Security Note
#2638175 is a Cross-Site Scripting (XSS) vulnerability in the SAP BusinessObjects Fiori
Launchpad. It is a classic XSS bug where an attacker may execute code in the client if a potential
victim accesses a specially crafted URL. Onapsis Security Platform customers have received
coverage for BusinessObjects since the launch of version 2.0 that came out last year. This
includes checking for missing notes like the one published this month.

Below is a summary of the type of vulnerabilities that were fixed this month, including not only
16 SAP Security Notes, but another six that were published in late January, after that month’s
Security Notes Patch Day.
As you may see in the SAP acknowledgment to Security Researchers, Onapsis is the only
company with several researchers on this page. Five of our team members have been
recognized this month based of their findings and reports. As always, we are working to update
the Onapsis Security Platform to incorporate these newly published vulnerabilities to allow our
customers to check whether their systems are up to date with the latest SAP Security Notes.
Follow us on Twitter to keep tracking ERP Security News and continue to read our ERP security
blog.

You might also like