SAP Sybase Adaptive Server Enterprise Version 15.7 ESD 2 and possibly earlier versions contains an XML injection vulnerability (CWE-91).
CWE-611:* *Improper Restriction of XML External Entity Reference ('XXE')
SAP Sybase Adaptive Server Enterprise (ASE) Version 15.7 ESD 2 contains an XML injection vulnerability, which can lead to information exposure. This is due to the expanded use of XML External Entity (XXE) Processing. The
XMLParse procedure is vulnerable to attack. Using a specially crafted SQL request, an authenticated attacker may be able to read files with the permissions of the user running the ASE application.
For example, the attacker can read the /etc/passwd file of the server using the following SQL query:
SELECT xmlextract('/', xmlparse('<?xml version="1.0" standalone="yes"?><!DOCTYPE content [ <!ENTITY abc SYSTEM "/etc/passwd">]><content>&abc;</content>'))
An authenticated attacker may be able to use the vulnerabilities to read user credentials. This may be used to obtain unauthorized administrative or privileged access to the system.
Apply an Update
SAP has released a patch on the Sybase downloads page. If an update cannot be applied, please consider the following workaround.
By disabling the external general entities feature of the SAXParserFactory used to parse the XML within Java code, the attacker cannot successfully make these requests. More details can be found on the OWASP XML External Entity (XXE) Processing page.
Vendor| Status| Date Notified| Date Updated
SAP| | 08 Jan 2013| 15 Oct 2013
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | 2.3 | AV:A/AC:M/Au:S/C:P/I:N/A:N
Temporal | 1.8 | E:POC/RL:OF/RC:C
Environmental | 1.4 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND
Thanks to Igor Bulatenko for reporting this vulnerability.
This document was written by Adam Rauf.