SAP Patch Day: March 2023

SAP Security Notes Blog

 

Critical Vulnerabilities patched in SAP NetWeaver AS ABAP / Java and in SAP BusinessObjects

Highlights of March SAP Security Notes analysis include:

  • March Summary—Twenty-one new and updated SAP security patches released, including six HotNews Notes and four High Priority Notes
  • Critical Patches affect all SAP Customers—Three new HotNews Notes for SAP Netweaver AS ABAP and JAVA 
  • Onapsis Research Labs Contribution—Our team supported SAP in patching fifteen vulnerabilities, covered by twelve SAP Security Notes

SAP has released twenty-one SAP Security Notes on its March Patch Day, including six HotNews Note and four High Priority Notes. 

The Onapsis Research Labs contributed to patching fifteen vulnerabilities, covered by twelve of the nineteen new SAP Security Notes. 

Two SAP Security Notes include minor updates of notes that were originally released in December 2022 and February 2023.

SAP Security Note #3273480, tagged with a CVSS score of 9.9, was the first patch fixing a series of Improper Access Control vulnerabilities in SAP NetWeaver AS Java that were detected by the Onapsis Research Labs. The solution was initially released on SAP’s December Patch Day and caused some side effects on the alerting and monitoring capabilities of SAP NW AS Java. The latest update of the note refers to two additional notes fixing these side effects.

SAP Security Note #3273480, tagged with a CVSS score of 6.1, was initially released in February and patches a Cross-Site Scripting vulnerability in the BSP framework of SAP NW AS ABAP. The update contains only minor text changes and customers do not need to take additional action if the note has already been applied to the affected systems. 

The HotNews Notes in Detail

Two of the five new HotNews Notes affect SAP Business Objects(SAP BO) Intelligence Platform. SAP Security Note #3245526, tagged with a CVSS score of 9.9, patches a vulnerability in the Central Management Console (CMC) that allows an attacker to inject arbitrary code with a strong negative impact on integrity, confidentiality, and availability of the system.

SAP Security Note #3283438 is tagged with a slightly lower CVSS score of 9.0 but that doesn’t mean it’s less critical. The lower CSS rating is due to the fact that a successful exploit requires interaction with another user. The note patches an OS Command Execution vulnerability in SAP BO Adaptive Job Server, allowing the execution of arbitrary OS commands over the network. The vulnerability only affects SAP BO installations on UNIX platforms.

Another two HotNews Notes, released in contribution with the Onapsis Research Labs (ORL) and are tagged with a CVSS score of 9.6 and patch critical Directory Traversal vulnerabilities in SAP NetWeaver AS ABAP.

SAP Security Note #3302162 disables the program SAPRSBRO used by SAP services to configure the system for industry specific texts. The patch no longer allows attackers with non-administrative authorizations to overwrite arbitrary critical OS files.

SAP Security Note #3294595 patches a similar vulnerability in other services of an SAP NetWeaver AS ABAP. This vulnerability was caused by the include program RSPOXTAB that allows access to files that are not assigned to a logical file name in the system. SAP previously resolved the issue in January via the correction note #1512430 (not a Security Note) by patching the consumers of this include program. However, the solution provided with SAP Security Note #3294595 is more secure since it directly fixes the include and thus automatically protects current as well as future customers. The fifth new HotNews patches another critical Improper Access Control vulnerability in SAP NetWeaver AS Java. SAP Security Note #3252433, tagged with a CVSS score of 9.9, patches the Locking Service of the AS Java, which is responsible for requesting the locks at the Enqueue Service. The vulnerability allows an unauthenticated attacker to attach to an open interface and make use of an open naming and directory API to access services. These services can be used to perform unauthorized operations and affect users and services across systems. 

The High Priority Notes in Detail

All four High Priority Notes were released in collaboration with the ORL and they patch seven vulnerabilities in total.

SAP Security Note #3296476, tagged with a CVSS score of 8.8, patches Remote Code Execution vulnerabilities in several remote-enabled function modules. These function modules are used by SAP’s Active Global Support to evaluate custom code and allow the dynamic call of arbitrary local function modules as long as their interface fulfills specific conditions. Attackers only require the appropriate S_RFC authorization, either on one of the function modules or on the complete function group. The vulnerable function group is shipped with the ST-PI Add-On and thus affects SolutionManager systems and the connected ABAP managed systems.

SAP Security Note #3294954, tagged with a CVSS score of 8.7, patches a Directory Traversal vulnerability in a remote-enabled function module of SAP NetWeaver AS ABAP. A successful exploit enables an attacker to delete arbitrary files at the OS level and make the system unavailable. The problem exists because an import parameter of the function module accepts relative file path expressions and does not check the parameter value appropriately.

SAP Security Note #3296346 patches a Server Side Request Forgery vulnerability, tagged with a CVSS score of 7.4 and a Denial of Service vulnerability, tagged with a CVSS score of 6.5. Improper input controls allow an attacker who is authenticated as a non-administrative user to craft a request which triggers the application server to send a request to an arbitrary url. This url could be used to reveal, modify, or make non-sensitive information unavailable, leading to low impact on confidentiality, integrity, and availability. The affected ABAP class also suffers from several vulnerabilities in error handling. This allows an attacker to craft a request with certain parameters that consume the server’s resources and make it unavailable. Since the class is not used anymore by SAP, the patch withdraws the implementation of the affected class.   

SAP Security Note #3275727 patches a Memory Corruption vulnerability in the SAPOSCOL executable that is tagged with a CVSS score of 7.2. An unauthenticated attacker with network access to a server port assigned to the SAP Start Service can submit a crafted request and cause a memory corruption error. This error can be used to read technical information about the server. It can also make a particular service temporarily unavailable.

Further Contribution of the Onapsis Research Labs

In addition to three HotNews Notes and four High Priority Notes, the ORL contributed to fixing five Medium Priority vulnerabilities.

SAP Security Note #3284550, tagged with a CVSS score of 6.8, patches an XML External Entity vulnerability in SAP Enterprise Portal. A missing validation check in the XML parser allows attackers with privileges to access the parser, submit crafted XML files, and gain read access to sensitive data.

SAP Security Note #3296328 withdraws the implementation of another class (refer to SAP Security Note #3296346). The class allowed an attacker to consume sufficient system resources via specially crafted requests to make the system unavailable.

The series of Improper Access Control vulnerabilities in SAP NetWeaver AS Java detected by the ORL is extended by three SAP Security Notes, all tagged with a CVSS score of 5.3. Each note patches a specific service with missing or insufficient authentication and authorization checks. This allows attackers to make use of an open naming and directory API to access a service which enables them to read sensitive server settings that could be used for subsequent attacks. The Security Notes and the patched services are:

 

SAP Security Note

Patched Service

#3288480

Object Analyzing Service

#3288096

Cache Management Service

#3288394

Classload Service

 

Summary & Conclusions

The number of new SAP Security Notes on SAP’s March Patch Day is comparable with the number of last month. The patched vulnerabilities have shown once more that input validation and proper authentication and authorization checks are key to protect applications. Another lesson learned of this Patch Day: Cleanup unused code as it often contains unrecognized security issues. 

SAP Note

Type

Description

Priority

CVSS

3289844

New

[CVE-2023-25615] SQL Injection vulnerability in SAP ABAP Platform

 

BC-DWB-TOO-TDF

Medium

6,8

3245526

New

[CVE-2023-25616] Code Injection vulnerability in SAP Business Objects Business Intelligence Platform (CMC)

 

BI-BIP-CMC

HotNews

9,9

3283438

New

[CVE-2023-25617] OS Command Execution vulnerability in SAP Business Objects Business Intelligence Platform (Adaptive Job Server)

 

BI-BIP-SRV

HotNews

9,0

3302710

New

[CVE-2023-27895] Information Disclosure vulnerability in SAP Authenticator for Android

 

BC-IAM-SSO-OTP

Medium

6,1

3296328

New

[CVE-2023-27270] Denial of Service (DoS) in SAP NetWeaver AS for ABAP and ABAP Platform

 

BC-MID-ICF

Medium

6,5

3294954

New

[CVE-2023-27501] Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform

 

BC-CTS-TMS

High

8,7

3252433

New

[CVE-2023-23857] Improper Access Control in SAP NetWeaver AS for Java

 

BC-CST-EQ

HotNews

9,9

3294595

New

[CVE-2023-27269] Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform

 

BC-CCM-PRN

HotNews

9,6

3296346

New

[CVE-2023-26459] Multiple vulnerabilities in SAP NetWeaver AS for ABAP and ABAP Platform

 

BC-MID-ICF

High

7,4

3281484

New

[CVE-2023-26457] Cross-Site Scripting (XSS) vulnerability in SAP Content Server

 

BC-SRV-KPR-CS

Medium

6,1

274920

New

[CVE-2023-0021] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver

 

BC-CCM-P3RN-PC

Medium

6,1

3302162

New

[CVE-2023-27500] Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform

 

BC-DOC-RIT

HotNews

9,6

3284550

New

[CVE-2023-26461] XML External Entity (XXE) vulnerability in SAP NetWeaver (SAP Enterprise Portal)

 

EP-PIN-PSL

Medium

6,8

3296476

New

[CVE-2023-27893] Arbitrary Code Execution in SAP Solution Manager and ABAP managed systems (ST-PI)

 

SV-SMG-SDD

High

8,8

3275727

New

[CVE-2023-27498] Memory Corruption vulnerability in SAPOSCOL

 

BC-CCM-MON-OS

High

7,2

3287120

New

[Multiple CVEs] Multiple vulnerabilities in the SAP BusinessObjects Business Intelligence platform

 

BI-BIP-INV

Medium

6,5

3288480

New

[CVE-2023-27268] Improper Access Control in SAP NetWeaver AS Java (Object Analyzing Service)

 

BC-JAS-COR-SES

Medium

5,3

3288096

New

[CVE-2023-26460] Improper Access Control in SAP NetWeaver AS Java (Cache Management Service)

 

BC-JAS-COR-CSH

Medium

5,3

3288394

New

[CVE-2023-24526] Improper Access Control in SAP NetWeaver AS Java (Classload Service)

 

BC-JAS-COR

Medium

5,3

3273480

Update

[CVE-2022-41272] Improper access control in SAP NetWeaver AS Java (User Defined Search)

 

BC-XI-CON-UDS

HotNews

9,9

3274585

Update

[CVE-2023-25614] Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver AS ABAP (BSP Framework)

 

BC-BSP

Medium

6,1

As always, the Onapsis Research Labs is updating The Onapsis Platform to incorporate the newly published vulnerabilities into the product, so our customers can protect their businesses.

For more information about the latest SAP security issues and our continuous efforts to share knowledge with the security community, subscribe to our monthly The Defenders Digest Onapsis Newsletter.