Close

HAVE QUESTIONS?

A partner account manager can help. Contact us today.

 Subscribe me to your mailing list

[ERPSCAN-16-020] SAP NetWeaver JAVA AS UDDI component – XXE vulnerability

Application: SAP AS JAVA
Versions Affected: SAP AS JAVA 7.4
Vendor URL: SAP
Bugs: XXE
Reported: 20.10.2015
Vendor response: 21.10.2015
Date of Public Advisory: 14.04.2016
Reference: SAP Security Note 2254389
Author: Vahagn Vardanyan (ERPScan)

Vulnerability Information

Class: denial of service
Impact: denial of service
Remotely Exploitable: Yes
Locally Exploitable: No
CVE: CVE-2016-4014

CVSS Information

CVSS v3 Base Score: 7.1 / 10
CVSS v3 Base Vector:

AV: Attack Vector (Related exploit range) Network (N)
AC: Attack Complexity (Required attack complexity) Low (L)
PR: Privileges Required (Level of privileges needed to exploit) None (N)
UI: User Interaction (Required user participation) None (N)
S: Scope (Change in scope due to impact caused to components beyond the vulnerable component) Unchanged (U)
C: Impact to Confidentiality None (N)
I: Impact to Integrity None (N)
A: Impact to Availability High (H)
VULNERABILITY DESCRIPTION

An attacker can trigger an XML Entity Expansion or XML External Entity Injection. This causes the entire machine to become unresponsive until the process is terminated manually. An attacker can use this flaw to perform a denial-of-service (DoS) attack.

VULNERABLE PACKAGES

SAP NetWeaver AS JAVA 7.4
Other versions are probably affected too, but they were not checked.

SOLUTIONS AND WORKAROUNDS

To correct this vulnerability, install SAP Security Note SAP Security Note 2254389

TECHNICAL DESCRIPTION

Proof of Concept