PT-2013-13: XML External Entities Injection in SAP NetWeaver
Version: 7.31 and earlier
Severity level: Medium
Impact: Internal Network Resources and File System Access, Denial of Service
Access Vector: Remote
Base Score: 6.4
CVE: not assigned
SAP NetWeaver is SAP's integrated technology computing platform and is the technical foundation for many SAP applications.
The specialists of the Positive Research center have detected an XML External Entities Injection vulnerability in SAP NetWeaver.
The vulnerability was detected in the "Live Update" webdynpro application of SAP NetWeaver. The "Live Update" application located at http://host/webdynpro/dispatcher/sap.com/tc~slm~ui_lup/LUP allows the use of external entities while parsing XML files which allows an attacker to read arbitrary files and get the contents of arbitrary directories.
How to fix
Update your software up to the latest version
18.01.2013 - Vendor gets vulnerability details
12.03.2013 - Vendor releases fixed version and details
23.10.2013 - Public disclosure
The vulnerability was detected by Arseny Reutov, Positive Research Center (Positive Technologies Company)
Reports on the vulnerabilities previously discovered by Positive Research: