SAP MII Remote Code Execution Due to Unrestricted File Upload
Impact On Business
An attacker that successfully exploits this vulnerability can execute OS Commands as <sid>adm user
Affected Components Description
Tested on following versions:
- SAP Java 7.40 with SAP MII 15.3
Vulnerability Details
SAP MII (Manufacturing Integration and Intelligence) has a platform called “Self Service Composition Environment (SSCE)” which allows users to “create dashboards using any SAP MII content, UI elements, and tags from Plant Information Catalog”. A vulnerability in this dashboard creation functionality lets users to create arbitrary files, this situation allows an attacker to craft a malicious request with executable code which, when requested, will be executed on the server.
Solution
SAP has released SAP Note 3158613 which provides patched versions of the affected components.
The patches can be downloaded from https://me.sap.com/notes/3158613.
Onapsis strongly recommends SAP customers to download the related security fixes and apply them to the affected components in order to reduce business risks.
Report Timeline
- 08/10/2021: Onapsis provides details to SAP
- TBD: SAP acknowledges the report
- 12/04/2022: SAP issues the patch.
References
Advisory Information
- Public Release Date: 09/18/2024
- Security Advisory ID: ONAPSIS-2024-0030
- Researcher(s): Nicolas Raus
Vulnerability Information
- Vendor: SAP
- Affected Components:
- SAP Manufacturing Integration and Intelligence
- Vulnerability Class: CWE-94 – Improper Control of Generation of Code (‘Code Injection’)
- CVSS v3 score: 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)
- Risk Level: Critical
- Assigned CVE: CVE-2021-21480
- Vendor patch Information: SAP Security NOTE 3158613
ABOUT OUR RESEARCH LABS
Onapsis Research Labs provides the industry analysis of key security issues that impact mission-critical systems and applications.
Delivering frequent and timely security and compliance advisories with associated risk levels, Onapsis Research Labs combine in-depth knowledge and experience to deliver technical and business-context with sound security judgment to the broader information security community.
Find all reported vulnerabilities at:
https://github.com/Onapsis/vulnerability_advisories
This advisory is licensed under a Creative Commons 4.0 BY-ND International License