PT-2012-61: XML External Entities Injection in SAP Sybase ASE Vulnerable softwareSAP Sybase ASE Version: 15.7 ESD 2 and earlierLink: http://www.sybase.com/products/databasemanagement/adaptiveserverenterpriseSeverity levelSeverity level: Medium Impact: File System Access Access Vector: Remote CVSS v2: Base Score: 4.0 Vector: (AV:N/AC:L/Au:S/C:P/I:N/A:N)CVE: CVE-2013-6025Software descriptionSAP Sybase ASE is a relative database management system developed by SAP. Vulnerability descriptionThe specialists of the Positive Research center have detected an XML External Entities Injection vulnerability in SAP Sybase ASE.The vulnerability was detected in the xmlparse procedure in SAP Sybase ASE. Using a specially crafted SQL request, unprivileged user is able to read arbitrary files with privileges of the user that run ASE.How to fixUpdate your software up to the latest versionAdvisory status27.12.2012 - Vulnerability details were sent to CERT 10.09.2013 - Vendor releases fixed version and details 24.10.2013 - Public disclosureCreditsThe vulnerability was detected by Igor Bulatenko, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2012-61 https://service.sap.com/sap/support/notes/1887341 http://www.kb.cert.org/vuls/id/303900 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/