PT-2011-46: Information disclosure in SAP

Vulnerable software

SAP

Application link:
http://www.sap.com

Severity level

Severity level: Medium
Impact: Information disclosure
Access Vector: Network exploitable 

CVSS v2:
Base Score: 5.0
Vector: (AV:N/AC:L/AU:N/C:P/I:N/A:N)

CVE: not assign

Vulnerability description

The specialists of the Positive Research center have detected "Information disclosure" vulnerability in SAP.

An Information Leakage vulnerability exists in the way SAProuter works with dynamic memory.
The cause of the leakage is that SAProuter does not clear the dynamically captured memory before reusing it.
The vulnerability may (on certain conditions) allow attackers to obtain configuration files contents (including routing rules and access passwords).

Moreover, the vulnerability potentially allows an attacker to obtain other users’ traffic that passes through SAProuter.

Routing table can be obtained by attackers after administrator locally executes the saprouter –n command (which activates configuration file changes).

How to fix

Update your software up to the latest version

Advisory status

02.12.11 - Vendor is notified
02.12.11 - Vendor gets vulnerability details
03.08.12 - Vendor releases fixed version and details
23.08.12 - Public disclosure

Credits

The vulnerability was discovered by Ilya Smith, Maxim Tsoy, Kirill Mosolov, Evgeny Ryzhov , Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2011-46
https://service.sap.com/sap/support/notes/1663732

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape
Visionary WAF – Constant innovation