PT-2013-13: XML External Entities Injection in SAP NetWeaver
Vulnerable software
SAP NetWeaver
Version: 7.31 and earlier
Link:
http://scn.sap.com/community/netweaver
Severity level
Severity level: Medium
Impact: Internal Network Resources and File System Access, Denial of Service
Access Vector: Remote
CVSS v2:
Base Score: 6.4
Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:P)
CVE: not assigned
Software description
SAP NetWeaver is SAP's integrated technology computing platform and is the technical foundation for many SAP applications.
Vulnerability description
The specialists of the Positive Research center have detected an XML External Entities Injection vulnerability in SAP NetWeaver.
The vulnerability was detected in the "Live Update" webdynpro application of SAP NetWeaver. The "Live Update" application located at http://host/webdynpro/dispatcher/sap.com/tc~slm~ui_lup/LUP allows the use of external entities while parsing XML files which allows an attacker to read arbitrary files and get the contents of arbitrary directories.
How to fix
Update your software up to the latest version
Advisory status
18.01.2013 - Vendor gets vulnerability details
12.03.2013 - Vendor releases fixed version and details
23.10.2013 - Public disclosure
Credits
The vulnerability was detected by Arseny Reutov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2013-13
Reports on the vulnerabilities previously discovered by Positive Research:
http://www.ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/