PT-2013-13: XML External Entities Injection in SAP NetWeaver Vulnerable softwareSAP NetWeaver Version: 7.31 and earlierLink: http://scn.sap.com/community/netweaverSeverity levelSeverity level: Medium Impact: Internal Network Resources and File System Access, Denial of Service Access Vector: Remote CVSS v2: Base Score: 6.4 Vector: (AV:N/AC:L/Au:N/C:P/I:N/A:P)CVE: not assignedSoftware descriptionSAP NetWeaver is SAP's integrated technology computing platform and is the technical foundation for many SAP applications. Vulnerability descriptionThe specialists of the Positive Research center have detected an XML External Entities Injection vulnerability in SAP NetWeaver.The vulnerability was detected in the "Live Update" webdynpro application of SAP NetWeaver. The "Live Update" application located at http://host/webdynpro/dispatcher/sap.com/tc~slm~ui_lup/LUP allows the use of external entities while parsing XML files which allows an attacker to read arbitrary files and get the contents of arbitrary directories.How to fixUpdate your software up to the latest versionAdvisory status18.01.2013 - Vendor gets vulnerability details 12.03.2013 - Vendor releases fixed version and details 23.10.2013 - Public disclosureCreditsThe vulnerability was detected by Arseny Reutov, Positive Research Center (Positive Technologies Company)Referenceshttp://en.securitylab.ru/lab/PT-2013-13 Reports on the vulnerabilities previously discovered by Positive Research:http://www.ptsecurity.com/research/advisory/ http://en.securitylab.ru/lab/