Lucene search

K
certCERTVU:303900
HistoryOct 17, 2013 - 12:00 a.m.

SAP Sybase Adaptive Server Enterprise vulnerable to XML injection

2013-10-1700:00:00
www.kb.cert.org
22

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.032 Low

EPSS

Percentile

91.3%

Overview

SAP Sybase Adaptive Server Enterprise Version 15.7 ESD 2 and possibly earlier versions contains an XML injection vulnerability (CWE-91).

Description

CWE-611**:******Improper Restriction of XML External Entity Reference (‘XXE’)

SAP Sybase Adaptive Server Enterprise (ASE) Version 15.7 ESD 2 contains an XML injection vulnerability, which can lead to information exposure. This is due to the expanded use of XML External Entity (XXE) Processing. The XMLParse procedure is vulnerable to attack. Using a specially crafted SQL request, an authenticated attacker may be able to read files with the permissions of the user running the ASE application.

For example, the attacker can read the /etc/passwd file of the server using the following SQL query:
SELECT xmlextract('/', xmlparse('<?xml version="1.0" standalone="yes"?><!DOCTYPE content [ <!ENTITY abc SYSTEM "/etc/passwd">]><content>&abc;</content>'))


Impact

An authenticated attacker may be able to use the vulnerabilities to read user credentials. This may be used to obtain unauthorized administrative or privileged access to the system.


Solution

Apply an Update
SAP has released a patch on the Sybase downloads page. If an update cannot be applied, please consider the following workaround.


Disable XXE
By disabling the external general entities feature of the SAXParserFactory used to parse the XML within Java code, the attacker cannot successfully make these requests. More details can be found on the OWASP XML External Entity (XXE) Processing page.


Vendor Information

303900

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

SAP Affected

Notified: January 08, 2013 Updated: October 15, 2013

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

We are not aware of further vendor information regarding this vulnerability.

CVSS Metrics

Group Score Vector
Base 2.3 AV:A/AC:M/Au:S/C:P/I:N/A:N
Temporal 1.8 E:POC/RL:OF/RC:C
Environmental 1.4 CDP:ND/TD:M/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Igor Bulatenko for reporting this vulnerability.

This document was written by Adam Rauf.

Other Information

CVE IDs: CVE-2013-6025
Date Public: 2013-10-01 Date First Published:

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.032 Low

EPSS

Percentile

91.3%