PT-2013-13: XML External Entities Injection in SAP NetWeaver

Vulnerable software

SAP NetWeaver
Version: 7.31 and earlier

Link:
http://scn.sap.com/community/netweaver

Severity level

Severity level: Medium
Impact: Internal Network Resources and File System Access, Denial of ServiceĀ 
Access Vector: Remote

CVSS v2:
Base Score: 6.4
Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:P)

CVE: not assigned

Software description

SAP NetWeaver is SAP's integrated technology computing platform and is the technical foundation for many SAP applications.

Vulnerability description

The specialists of the Positive Research center have detected an XML External Entities Injection vulnerability in SAP NetWeaver.

The vulnerability was detected in the "Live Update" webdynpro application of SAP NetWeaver. The "Live Update" application located at http://host/webdynpro/dispatcher/sap.com/tc~slm~ui_lup/LUP allows the use of external entities while parsing XML files which allows an attacker to read arbitrary files and get the contents of arbitrary directories.

How to fix

Update your software up to the latest version

Advisory status

18.01.2013 - Vendor gets vulnerability details
12.03.2013 - Vendor releases fixed version and details
23.10.2013 - Public disclosure

Credits

The vulnerability was detected by Arseny Reutov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2013-13

Reports on the vulnerabilities previously discovered by Positive Research:

http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape