Lucene search

K
erpscanVahagn Vardanyan (ERPScan)ERPSCAN-15-013
HistoryJun 16, 2014 - 12:00 a.m.

SAP NetWeaver AS Java CIM UPLOAD - XXE

2014-06-1600:00:00
Vahagn Vardanyan (ERPScan)
erpscan.io
21

0.007 Low

EPSS

Percentile

80.2%

Application: SAP NetWeaver AS Java Vendor URL:http://www.sap.com **Bugs:**XML External Entity **Reported:**16.06.2014 **Vendor response:**17.06.2014 **Date of Public Advisory:**18.05.2015 **Reference:**SAP Security Note 2090851 Authors: Vahagn Vardanyan (ERPScan)

VULNERABILITY INFORMATION
Class: XML External Entity [CWE-611]
Impact: Information Disclosure, Denial of Service
Remotely Exploitable: Yes
Locally Exploitable: No
CVE Name: CVE-2015-4091

Business Risk
It is possible for attackers to send any packets to any port of any system including localhost.
It means that it is possible, for example, to send any administrative command to Gateway or Message Server because the source of the packet will be localhost, and there are no restrictions for localhost. Another example is an attack on other interfaces.

Description
SAP XML parser validates all incoming XML requests with user specified DTD.

VULNERABLE PACKAGES
SAP NetWeaver AS Java 7.4
Other versions are probably affected too, but they were not checked.

SOLUTIONS AND WORKAROUNDS
To correct this vulnerability, install SAP Security Note 2090851

TECHNICAL DESCRIPTION
SAP XML parser (/sap.com/tc~sld~wd~main/Main) validates all incoming XML requests with a user-specified DTD.

Defense
To prevent this issue as well as a plethora of other vulnerabilities that may affect your systems, ERPScan provides the following services:

0.007 Low

EPSS

Percentile

80.2%

Related for ERPSCAN-15-013