SAP Security Notes, April 2023

Inprosec through its services, such as the SAP Security Assessment, helps its customers to improve the security levels of their SAP systems.

April 2023 notes

Summary and highlights of the month

The total number of notes/patches was 24, 3 more than last month. The number of Hot News decreased from 6 to 5 this month. On the other hand, it is worth noting that the number of high criticality notes decreases from 4 to 1. As usual we will leave the medium and low notes unchecked this month, but we will give details of a total of 6 notes (all those with a CVSS of 7 or higher).

We have a total of 24 scores for the whole month (the 24 from Patch Tuesday, 19 new ones and 5 updates, that’s 5 more scores than last month).

We will review in detail the high note, which is new and the 5 HotNews, 3 updates and 2 new:

  • The most critical notes of the month (with CVSS 10) are 2 HotNews, one related to “Multiple vulnerabilities in SAP Diagnostics Agent” and the other is an update to the usual note related to “Google Chromium”.
  • Next in criticality (with CVSS 9.9) is an update of a HotNews released in December 2022, related to “Improper access control in SAP NetWeaver AS Java“.
  • The next criticality notes (with CVSS 9.8 and 9.6) are 2 HotNews, the first one related to “Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform“, the second one is an update of a note released last March 2023, related to “Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform“.
  • Next in criticality is the high score (with CVSS 8.7) related to “Directory Traversal vulnerability in SAP NetWeaver ( BI CONT ADD ON)“.
  • This month the most predominant type is “Code Injection vulnerability” (4/24 in patch day).

In the graph (post April 2023 by SAP) we can see the ranking of the April notes in addition to the evolution and ranking of the last 5 previous months (only the notes of Sec. Tuesday / Patch Day – by SAP):

 

Full details

The complete detail of the most relevant notes is as follows:

  1. Update – Security updates for the browser control Google Chromium delivered with SAP Business Client (2622660): This security note addresses multiple vulnerabilities in the 3rd party web browser control Chromium, which can be used within SAP Business Client. This note will be modified periodically based on web browser updates by the open-source project Chromium. The note priority is based on the highest CVSS score of all the vulnerabilities fixed in the latest browser release. If the SAP Business Client release is not updated to the latest patch level, displaying web pages in SAP Business Client via this open-source browser control might lead to different vulnerabilities like memory corruption, Information Disclosure and the like. The solution will be to update the SAP Business Client patch to the newest one, which contains the most current stable major release of the Chromium browser control, which passed the SAP internal quality measurements of SAP Business Client. The note has been re-released with updated ‘Solution’ and ‘Support Packages & Patches’ information CVSS v3 Base Score: 10 / 10 (Multiple CVE´s).
  2. Multiple vulnerabilities in SAP Diagnostics Agent (OSCommand Bridge and EventLogServiceCollector)( 3305369): This note lists 2 vulnerabilities in SAP Diagnosis Agent both derived from Unauthenticated RCE, one related to EventLogServiceCollector which allows an attacker to execute malicious scripts on all connected Diagnosis Agents running on Windows and the other due to lack of authentication and insufficient input validation, the OSCommand bridge allows to execute malicious scripts on all connected Diagnosis Agents running on all operating systems, both vulnerabilities compromise the confidentiality, integrity and availability of the system. CVSS v3 Base Score: 10 / 10 [CVE-2023-27497].
  3. Update – Improper access control in SAP NetWeaver AS Java (User Defined Search) (3273480): An unauthenticated attacker over the network can attach to an open interface exposed through JNDI by the User Defined Search (UDS) of SAP NetWeaver Process Integration (PI) and make use of an open naming and directory api to access services which can be used to perform unauthorized operations affecting users and data across the entire system. This allows the attacker to have full read access for user data, to make limited modifications to user data and to degrade performance of the system, leading to high impact on confidentiality and limited impact on availability and integrity of the application. The note has been re-released to provide the fix to SP026 for version 7.50. CVSS v3 Base Score: 9,9 / 10 [CVE-2022-41272].
  4. Information Disclosure vulnerability in SAP BusinessObjects Business Intelligence Platform (Promotion Management )( 3298961): The encrypted information stored in the lcmbiar file can be read due to the lack of password protection causing an attacker to gain access to the BI user’s passwords and depending on the BI user’s privileges, the attacker can perform operations that can completely compromise the application. CVSS v3 Base Score: 9,8 / 10 [CVE-2023-28765].
  5. Update – Directory Traversal vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform (3294595): SAP NetWeaver Application Server for ABAP and ABAP Platform allows an attacker with non-administrative authorizations to exploit a directory traversal flaw in an available service to overwrite the system files.  In this attack, no data can be read but potentially critical OS files can be overwritten making the system unavailable. In addition to the solution provided by the patch upload the note contains a workaround. This note has been re-released with updated ‘Solution’ information. CVSS v3 Base Score: 9,6 / 10 [CVE-2023-27269].
  6. Directory Traversal vulnerability in SAP NetWeaver ( BI CONT ADD ON) (3305907): Insufficient authority checks and file validations before executing the file upload in BI_CONT causes an attacker can exploit a Directory Traversal vulnerability in a report to upload and overwrite files on the SAP server. Base Score: 8,7 / 10 [CVE-2023-29186].

Reference links

Other references, from SAP and Onapsis (April):

Digital Library (sap.com)

SAP Security Patch Day – April 2023 | Onapsis

Resources affected

  • SAP Business Client, Versions -6.5, 7.0, 7.70
  • SAP BusinessObjects Business Intelligence Platform (Promotion Management,Versions–420, 430
  • SAP Diagnostics Agent (OSCommand Bridge and EventLogServiceCollector),Version –720
  • SAP NetWeaver (BI CONT ADDON), Versions -707, 737, 747, 757
  • SAP NetWeaver Application Server for ABAP and ABAP Platform, Versions -700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 791
  • SAP NetWeaver Process Integration, Version –7.50

Did you like it?

Share it on social media!

Leave a Reply

Your email address will not be published. Required fields are marked *

Fill out this field
Fill out this field
Please enter a valid email address.
You need to agree with the terms to proceed

Categories

Calendar of posts

Our services

keyboard_arrow_up