SAP released its monthly critical patch update for January 2015. This month, one critical vulnerability found by ERPScan researcher Nikolay Mescherin was closed.
The most critical issues
Our readers and clients asked us to categorize the most critical SAP vulnerabilities to patch them first. The companies that provide SAP Security Assessment, SAP Vulnerability Assessment, or SAP Penetration Testing services can include these vulnerabilities in their checklists. The most critical vulnerabilities of this update can be patched by the following SAP Security Notes:
- 2113333: SAP Sybase ASE Database Platform has an SQL Injection vulnerability. An attacker can use SQL Injections with the help of specially crafted SQL queries. They can read and modify the sensitive information from a database, execute administrative operations in a database, destroy the data or make it unavailable. In some cases, an attacker can access the system data or execute OS commands. It is recommended to install this SAP Security Note to prevent risks.
- 2098906: SAP HANA Extended Application Services has an ABAP Code Injection vulnerability. Depending on the code, an attacker can inject and run their own code, obtain the additional information that should not be displayed, modify or delete the data, modify system output, create new users with higher privileges, control the system behavior. They can also potentially escalate privileges by executing malicious code or even perform a DoS attack. It is recommended to install this SAP Security Note to prevent risks.
- 2000401: SAP Dealer Portal has a Missing Authorization Check vulnerability. An attacker can use a Missing Authorization Check to access a service without any authorization procedures and use the service functionality that has a restricted access. This can lead to the information disclosure, the privilege escalation, and other attacks.It is recommended to install this SAP Security Note to prevent risks.
Issues that were patched with the help of ERPScan
The detailed list of the corrected vulnerabilities that were found by ERPScan researchers is below.
- An XML eXternal Entity vulnerability in SAP Extended Computer Aided Test Tool. The update is available in SAP Security Note 2016638. An attacker can use XML eXternal Entities to send specially crafted unauthorized XML requests, which will be processed by the XML parser. The attacker will get an unauthorized access to the OS filesystem.
It is highly recommended to patch all those issues to prevent business risks.
SAP traditionally published acknowledgments to the security researchers of ERPScan on their website. Advisories with technical details will soon be published at ERPScan.com. Checks for the issues are already available in ERPScan Security Monitoring Suite.