Application: SAP AS JAVA P4
Versions Affected: SAP AS JAVA P4 7.4
Vendor URL: SAP
Bugs: Information disclosure
Reported: 10.03.2016
Vendor response: 11.03.2016
Date of Public Advisory: 12.10.2016
Reference: SAP Security Note 2331908
Author: Vahagn Vardanyan (ERPScan)

VULNERABILITY INFORMATION

Class: Information disclosure
Impact: broken authentication
Remotely Exploitable: yes
Locally Exploitable: no

CVSS Information

CVSS Base Score v3: 7.3 / 10 CVSS Base Vector:

AV: Attack Vector (Related exploit range) Network (N)
AC: Attack Complexity (Required attack complexity) Low (L)
PR: Privileges Required (Level of privileges needed to exploit) None (N)
UI: User Interaction (Required user participation) None (N)
S: Scope (Change in scope due to impact caused to components beyond the vulnerable component) Unchanged (U)
C: Impact to Confidentiality Low (L)
I: Impact to Integrity Low (L)
A: Impact to Availability Low (L)

Description

Anonymous attacker can send a special request and get sensitive information about an SAP system using SAP P4.

Business risk

An attacker can use an Information disclosure vulnerability to reveal additional information (system data, debugging information, etc.) which will help to learn about a system and to plan other attacks.

VULNERABLE PACKAGES

SERVERCORE 7.11
SERVERCORE 7.20
SERVERCORE 7.30
SERVERCORE 7.31
SERVERCORE 7.40
SERVERCORE 7.50

SOLUTIONS AND WORKAROUNDS

To correct this vulnerability, install SAP Security Note 2331908

TECHNICAL DESCRIPTION

SAP AS JAVA P4 function msp (MSPRuntimeInterface) does not require any authorization to call the following functions:
getInformation
getParameters
getServiceInfo
getStatistic
getClientStatistic

PoC (Java language)