Notas de Seguridad SAP, Q4 2020

Inprosec a través de sus servicios, como el SAP Security Assessment, ayuda a sus clientes a mejorar los niveles de seguridad de sus sistemas SAP.

Hoy os traemos la actualización de las notas de seguridad de SAP, del Q4 de 2020. En este trimestre se ha producido una ligera subida en cuanto al número de notas en relación con el anterior, además,  seguimos teniendo un número significativo de notas críticas y en el mismo trimestre tenemos cuatro notas nuevas de máxima criticidad (CVSS 10). Destacar, que al menos tres de ellas podrían afectar de forma considerable, ya que precisamente son para SAP Solution Manager (que a su vez es la herramienta recomendada para la gestión y aplicación de las notas).

Notas Q4 2020

Resumen y highlights del Trimestre

Como se comentaba, el número total de notas/parches ha aumentado con respecto al último trimestre. También aumenta el número de notas críticas y  altas. Al contrario que en otros trimestres, donde no encontrábamos ninguna nota baja, éstas sí están presentes en este trimestre. Como siempre dejaremos las notas medias y bajas sin revisar en este trimestre, pero daremos detalle de un total de 24 notas (todas las que tengan un CVSS de 7 o mayor). Como adelantábamos, sí destaca que las notas críticas, son especialmente de muy alto nivel (CVSS).

Tenemos 8 notas críticas (Hot News) nuevas, siendo el total de 12 en este trimestre. Además revisaremos en detalle 12 del total de 12 notas altas (aquellas de CVSS mayor o igual a 7) para la revisión en detalle de 24 notas distintas.

  • Las notas más críticas del trimestre (las cuatro con CVSS 10) serían dos relacionadas con la falta de verificación de autentificación en SAP Solution Manager, una con la falta de verificación de autentificación en SAP NetWeaver AS JAVA y otra que afectaría a CA Introscope Enterprise Manager.
  • Las siguientes en criticidad (CVSS 9.8) son 2. Una es la habitual “Browser Control Chromium Delivered with SAP Business Client (2622660)” y otra relacionada con múltiples vulnerabilidades en SAP Data Services.
  • A partir de ahí, tenemos una crítica con CVSS de 9.6, cuatro con 9.1 y la última con un CVSS de 9.
  • De las de nivel alto quizás debamos destacar que existe una que estaría afectando a Solution Manager, con CVVS de 8.5, y otra para SAP NetWeaver (ABAP Server) and ABAP Platform, con CVSS de 8.3, siendo un update del mes de agosto.

Tenemos un total de 62 notas para todo el trimestre, 1 más que el pasado trimestre (49 de los patch Tuesday, 7 más que el pasado trimestre):

  • En Octubre se han publicado un total de 29 notas (21 en el Security Notes Tuesday – 15 nuevas y 6 actualización de notas anteriores).
    • Tenemos 1 nota críticas (Hot News) nueva, siendo el total de 2 en este mes que destacan por su alto CVVS, una de ellas la actualización recurrente para el SAP Business Client con Chromium . Además revisaremos en detalle 7 del total de 7 notas altas (aquellas de CVSS mayor o igual a 7) donde este mes localizamos 3 nuevas y 4 actualizaciones.
    • La nota más crítica del mes (con CVSS 10) es  una de OS Command Injection Vulnerability in CA Introscope Enterprise Manager que afecta a  SAP Solution Manager y SAP Focused Run.
    • La siguiente en criticidad (CVSS 9.8) es una nota que se vuelve a repetir para “Browser Control Chromium Delivered with SAP Business Client (2622660)”.
    • A partir de ahí, localizamos las 7 notas de de criticidad alta (high priority) siendo la más relevante con un CVSS de 8.3 un update que afecta a SAP NetWeaver (ABAP) and ABAP Platform. El resto (20) son de nivel medio y bajo, y no las veremos en detalle, aunque cabe destacar que hay más de una que afecta a SAP Commerce Cloud.
    • Este mes los tipos más predominantes son “Cross-Site Scripting (XSS)” (8/29 y 6/21 en patch day) y “Missing Authorization Check” (5/29 y 2*/21 en patch day).
  • En Noviembre se han publicado un total de 19 notas (15 en el Security Notes Tuesday – 12 nuevas y 3 actualizaciones de notas anteriores).
    • Además tenemos un total de 6 “hot news” (críticas), destacando 2 notas con la nota máxima de CVVS (10), que serían la relativa a la falta de comprobaciones de autenticación en Solution Manager y una actualización de la nota que veíamos en mayo y que permitía a atacantes ejecutar comandos arbitrarios, comprometiendo la integridad del sistema.
    • Las notas más críticas del mes (ambas con CVSS 10) serían una que afecta a la falta de verificación de autentificación en SAP Solution Manager y otra un update de una nota del mes de mayo.
    • La siguiente en criticidad (CVSS 9.8)  es una nota que resuelve varias vulnerabilidades en SAP Data Services que comprometían la integridad del sistema.
    • A partir de ahí, tenemos dos notas críticas con CVSS de 9.1, y otra con un CVSS de 9.
    • Existen también un total de 3 notas de nivel alto, una que afecta a SAP Fiori Launchpad, con una nota de 8.6, y 2 relacionadas con SAP Commerce Cloud, ambas con CVVS 7.5. El resto (10) son de nivel medio y bajo, y no las veremos en detalle.
    • Este mes los tipos más predominantes son “Information Disclosure” (3/19 y 4/15 en patch day), “Missing Authorization Check” (2/19 y 3/15 en patch day) y “Missing Authentication Check” (2/19 y 5/15 en patch day).
  • En Diciembre se han publicado un total de 14 notas (13 en el Security Notes Tuesday – 11 nuevas y 2 actualizaciones de una nota anterior).
    • Tenemos 3 notas críticas (Hot News) nuevas, siendo el total de 4 en este mes que destacan por su alto CVVS.
    • La nota más crítica del mes (con CVSS 10) es una de Missing Authentication Check que afecta a SAP NetWeaver AS JAVA (P2P Cluster Communication).
    • La siguiente en criticidad (CVSS 9.6) es una nota de Missing XML Validation que afecta a AP BusinessObjects Business Intelligence Platform.
    • A partir de ahí, localizamos las 2 notas de criticidad alta (high priority) siendo la más relevante con un CVSS de 8.5 una nueva nota que afecta a SAP Solution Manager 7.2. El resto (8) son de nivel medio y bajo, y no las veremos en detalle, aunque cabe destacar que hay más de una que afecta a SAP NetWeaver.
    • Este mes los tipos más predominantes son “Code Injection” (2/14 y 2/13 en patch day) y “Missing Authentication Check” (2/14 y 1/21 en patch day).

 

En la gráfica (post Diciembre 2020 de SAP) podemos ver la evolución y clasificación de las notas de los 3 meses del último trimestre del año (2020), además de los 3 meses del pasado trimestre (solo las notas del Sec. Tuesday / Patch Day – by SAP):

 

Detalle completo

El detalle completo de las notas más relevantes es el siguiente (en inglés):

  1. OS Command Injection Vulnerability in CA Introscope Enterprise Manager (Affected Products: SAP Solution Manager and SAP Focused Run) (2969828): It affects all CA Introscope Enterprise Manager versions with release 10.7.0.304 or lower. The vulnerability can allow an attacker to inject OS commands and thus gain complete control of the host running the CA Introscope Enterprise Manager. The CVSS score of 10 considers the fact that an exploit can be started remotely and does not require authentication or any privileges. CVSS v3 Base Score: 10 / 10 (CVE-2020-6364]).
  2. Update – Security updates for the browser control Google Chromium delivered with SAP Business Client (2622660): This note addresses multiple vulnerabilities in the third-party web browser control Chromium, which is used in SAP Business Client and is periodically updated based on web browser updates. Since exploits for third-party tools are more common than exploits that are SAP-specific, which tend to be more targeted and selective, it is important to keep this note installed with every update to stay secure. This update patches 25 security issues, seven of them with High Priority. CVSS v3 Base Score: 9.8 / 10.
  3. Update – Code Injection Vulnerability in SAP NetWeaver (ABAP) and ABAP Platform (2941667): This note has been re-released with the updated automatic correction instruction for NW Release 750 to additionally cover SP00 to SP05. SAP NetWeaver (ABAP Server) and ABAP Platform allows a low privileged attacker to inject code by executing an ABAP report over the network. An attacker could so get access to data, overwrite arbitrary SAP programs including essential logon program and could thereby lead to a Denial of Service. CVSS v3 Base Score: 8.3 / 10 (CVE-2020-6296).
  4. Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Composite Application Framework (2972661): It allows an unauthenticated attacker to trick an unsuspecting authenticated user to click on a malicious link. The end user’s browser has no way to know that the script should not be trusted, and will execute the script, resulting in sensitive information being disclosed or modified. CVSS v3 Base Score: 8.2 / 10 (CVE-2020-6367).
  5. Missing XML Validation in SAP NetWeaver (Compare Systems) (2969457): A missing XML validation allows an attacker with administrative privileges to retrieve arbitrary files from the OS level of the application server and/or to start a denial-of-service attack.. CVSS v3 Base Score: 7.6 / 10 (CVE-2020-6366).
  6. Hard-coded Credentials in CA Introscope Enterprise Manager (Affected products: SAP Solution Manager and SAP Focused Run) (2971638): It allows a remote attacker to bypass authentication if the default passwords for Admin and Guest have not been changed. CVSS v3 Base Score: 7.5 / 10 (CVE-2020-6369).
  7. Update – Missing Authentication check in SAP NetWeaver AS JAVA (2941315): This note has been re-released with updated ‘Support Packages & Patches’ information. For the release ESI – WSRM 7.11, we added the Patch level 000001 under SP019 and for the release  ENGINEAPI 7.10, we added the  Patch level 000007 under SP024.SAP NetWeaver application exposes a web service which does not perform any authentication checks leading to complete denial of service. The solution: Update to latest available patch level as mentioned in the note. CVSS v3 Base Score: 7.5 / 10 (CVE-2020-6309).
  8. Update – Information Disclosure in SAP Business Objects Business Intelligence Platform (dswsbobje Web Application) (2898077): This note has been re-released with updated ‘Support Packages & Patches’ information. For the release SBOP BI PLATFORM SERVERS 4.2, we added the Patch level 001000 under SP007.Under certain conditions SAP Business Objects – dswsbobje web application allows an attacker to access information which would otherwise be restricted. Some well-known impacts of Information Disclosure are: loss of information and system configuration confidentiality or information gathering for further exploits and attacks. CVSS v3 Base Score: 7.5 / 10 (CVE-2020-6238).
  9. Privilege Escalation in SAP Landscape Management (SAP Adaptive Extensions) (2902456): This note has been re-released with updated ‘Support Packages & Patches’ information. We added the patch 000053 for the component SAP ADAPTIVE EXTENSIONS 1.0. An attacker with admin_group privileges could change ownership and permissions of arbitrary files remotely. This results in the possibility to execute these files as root user from a non-root context. The solution: Install SAP Adaptive Extensions patch 53 or newer. CVSS v3 Base Score: 7.2 / 10 (CVE-2020-6236).
  10. Missing Authentication Check in SAP Solution Manager (JAVA stack) (2985866): Some Authentication checks are missing in SAP Solution Manager (software component LM-SERVICE). An un-authenticated attacker is able to compromise the system. This has an impact to the integrity as well as availability of the service. The fix enables user authentication. CVSS v3 Base Score: 10 / 10 (Multiple CVE IDs).
  11. Update – Missing Authentication Check in SAP Solution Manager (2890213): SAP Solution Manager User-Experience Monitoring does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager. This fix enables user authentication on the User-Experience Monitoring administration service and thereby removes the root cause of finding CVE-2020-6207. CVSS v3 Base Score: 10 / 10 (CVE-2020-6207).
  12. Multiple Vulnerabilities in SAP Data Services (2982840): An insufficient input validation allows an unauthenticated attacker to send malicious requests that could result in remote code execution and thus, a complete compromise of system confidentiality, integrity and availability.. CVSS v3 Base Score: 9.8 / 10 (Multiple CVE IDs).
  13. Code Injection in SAP AS ABAP and S/4 HANA (DMIS) (2973735): SAP AS ABAP and SAP S/4 HANA allows an authenticated attacker to inject arbitrary code in the application and change the course of execution. Due to lack of input validation, an attacker, who was granted access (S_RFC) to execute the function module can inject malicious ABAP code, which will be saved persistently in a report in the ABAP repository. This report can then be executed by using the remote function module without additional authorization checks. The successful exploitation of the identified vulnerability can allow the attacker to take complete control of the affected system. The solution for the issue is to introduce an authorization check (object S_DMIS, level ‘Package’, and activity value ’01’ – create and generate) in the affected function module, and to remove/delete the generated coding from the ABAP repository. The generated report still exists but without any coding, therefore removing the possibility to exploit the identified vulnerability. CVSS v3 Base Score: 9.1 / 10 (CVE-2020-26808).
  14. Privilege escalation in SAP NetWeaver Application Server for Java (UDDI Server) (2979062): The UDDI Server of SAP NetWeaver Application Server for Java allows an attacker to execute arbitrary OS commands without having the required permissions, known as escalation of privileges vulnerability. Potential impact is total compromise of confidentiality, integrity and availability of server OS. Arbitrary OS command execution is now prevented by prefer list approach. CVSS v3 Base Score: 9.1 / 10 (CVE-2020-26820).
  15. Update – Cross-Site Scripting (XSS) in SAP NetWeaver (Knowledge Management) (2928635): SAP NetWeaver Knowledge Management (KM) allows the automatic execution of script content in a stored file due to inadequate filtering with the accessing user’s privileges. If the accessing user has administrative privileges, then the execution of the script content could result in complete compromise of system confidentiality, integrity and availability. Malicious resource execution in SAP NetWeaver Knowledge Management is fixed now. CVSS v3 Base Score: 9 / 10 (CVE-2020-6284).
  16. Security Vulnerabilities in SAP Fiori Launchpad (NewsTile Application) (2984627): SAP Fiori Launchpad News tile Application allows an unauthorized attacker to send a crafted request to a vulnerable web application, resulting in a Server-Side Request Forgery vulnerability. Besides, an unauthorized attacker can use SAP Fiori Launchpad News tile Application to send malicious code, to a different end user (victim), because News tile does not sufficiently encode user controlled inputs, resulting in Reflected Cross-Site Scripting (XSS) vulnerability. In order to solve this issue, the affected system components no longer reveal internal information to non-authenticated users. CVSS v3 Base Score: 8.6 / 10 (CVE-2020-26815 and CVE-2020-26825)
  17. Information Disclosure in SAP Commerce Cloud (2975189): An attacker can bypass existing authentication and permission checks via the “/medias” endpoint in SAP Commerce, hence gaining access to Secure Media folders. This folder could contain sensitive files that results in disclosure of sensitive information and impact system configuration confidentiality. Additional controls have been implemented to restrict access to secure media folders.  CVSS v3 Base Score: 7.5 / 10 (CVE-2020-26809).
  18. Multiple Vulnerabilities in SAP Commerce Cloud (Accelerator Payment Mock) (2975170): An unauthenticated attacker can submit a crafted request over a network to a particular SAP Commerce module URL which will be processed without further interaction. There is a crafted request which can render the SAP Commerce service itself unavailable with no impact on confidentiality or integrity. Users of SAP Commerce can protect from this vulnerability by upgrading to the latest patch release. CVSS v3 Base Score: 7.5 / 10 (CVE-2020-26810 and CVE-2020-26811).
  19. Missing Authentication Check In SAP NetWeaver AS JAVA (P2P Cluster Communication) (2974774): P2P Cluster Communication is dedicated for the server nodes in the cluster to exchange messages between each other. However, due to implementation flaw, it accepts arbitrary connections even from processes that are outside the cluster and even outside the network segment dedicated for the internal cluster communication. As result, an unauthenticated attacker can invoke certain functions that would otherwise be restricted to system administrators only, including access to system administration functions or shutting down the system completely. The solution: The Server Socket for P2P communication now listens only on the network interface dedicated to internal cluster communication. Extra security measures have been introduced in the P2P handshake protocol so that if attackers gain access to the network segment dedicated to the AS Java Cluster, they cannot establish connection to the P2P Server Socket of any server nodes in the Cluster. CVSS v3 Base Score: 10 / 10 (CVE-2020-26829).
  20. Missing XML Validation in SAP BusinessObjects Business Intelligence Platform (Crystal Report) (2989075): Fixes a Missing XML Validation vulnerability in the Crystal Report component of SAP Business Objects. An exploit would allow an attacker with basic privileges to inject arbitrary XML entities leading to the disclosure of internal files and directories and allowing Server Side Request Forgery (SSRF) as well as Denial-of-Service (DoS) attacks. CVSS v3 Base Score: 9.6 / 10 (CVE-2020-26831).
  21. Code Injection vulnerability in SAP Business Warehouse (Master Data Management) and SAP BW4HANA (2983367): Describes a Code Injection vulnerability which affects SAP BW Master Data Management and SAP BW4HANA. Only the fact that an attacker requires high privileges prevents the vulnerability from becoming the sixth CVSS 10 vulnerability in 2020. Having these privileges, an attacker can submit crafted requests to generate and execute arbitrary code without any additional user interaction and thus, potentially leading to a full compromise of the system’s confidentiality, integrity, and availability. CVSS v3 Base Score: 9.1 / 10 (CVE-2020-26838).
  22. Update – Code Injection in SAP AS ABAP and S/4 HANA (DMIS) (2973735): The patched vulnerability affects the SAP Landscape Transformation (SLT) component of SAP NetWeaver AS ABAP and S/4 HANA systems and allows a remote attacker to inject and execute arbitrary code and thus taking complete control of the affected system. CVSS v3 Base Score: 9.1 / 10 (CVE-2020-26808).
  23. Path traversal and Missing Authorization check in SAP Solution Manager 7.2 (User Experience Monitoring) (2983204): This note solves a Path Traversal vulnerability and a Missing Authentication vulnerability in the User Experience Monitoring component of Solution Manager. Exploiting both vulnerabilities, a remote attacker having access to an unprivileged user could partially compromise availability in making certain services unavailable. The exploits would even allow the attacker to gain access to sensitive information such as usernames and passwords that can be used to access other SAP systems in the landscape. CVSS v3 Base Score: 8.5/ 10 (CVE-2020-26837).
  24. Missing Authorization check in SAP NetWeaver AS ABAP and SAP S4 HANA (SAP Landscape Transformation) (2993132): Fixes an issue in the SLT component of SAP NetWeaver AS ABAP and S/4 HANA systems. A missing explicit authorization check-in a remote enabled function module allowed a high privileged user to execute functions to which access should be restricted. CVSS v3 Base Score: 7.6 / 10 (CVE-2020-26832).

Enlaces de referencia

Enlaces de referencia del CERT del INCIBE en relación a la publicación de las notas para los 3 meses de este trimestre:

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/actualizacion-seguridad-sap-octubre-2020

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/actualizacion-seguridad-sap-noviembre-2020

https://www.incibe-cert.es/alerta-temprana/avisos-seguridad/actualizacion-seguridad-sap-diciembre-2020

 

Otras referencias, en inglés de SAP y Onapsis (en orden: Octubre->Diciembre):

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=558632196

https://onapsis.com/blog/sap-security-notes-October-2020

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571

https://onapsis.com/blog/sap-security-notes-november-2020

https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=564757079

https://onapsis.com/blog/sap-security-notes-december-2020

Recursos afectados

    • BANKING SERVICES FROM SAP 9.0 (Bank Analyzer), versión 500;
    • S/4HANA FIN PROD SUBLDGR, versión 100;
    • SAP 3D Visual Enterprise Viewer, versión 9;
    • SAP Adaptive Extensions, versión 1.0;
    • SAP Adaptive Server Enterprise, versiones 15.7, 16.0.
    • SAP AS ABAP(DMIS), versiones 2011_1_620, 2011_1_640, 2011_1_700, 2011_1_710, 2011_1_730, 2011_1_731, 2011_1_752 y 2020;
    • SAP Business Client, versión 6.5;
    • SAP Business Objects Business Intelligence Platform, versiones 4.1, 4.2 y 4.3.
    • SAP Business Objects BI Platform (Crystal Report), versiones 4.1, 4.2 y 4.3;
    • SAP Business Planning y Consolidation, versiones 750, 751, 752, 753, 754, 755, 810, 100 y 200;
    • SAP Business Warehouse, versiones 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755 y 782;
    • SAP BW4HANA, versiones 100 y 200;
    • SAP Commerce Cloud, versiones 1808, 1811, 1905 y 2005;
    • SAP Data Services, versión 4.2;
    • SAP Disclosure Management, versión 10.1;
    • SAP ERP, versiones 600, 602, 603, 604, 605, 606, 616, 617 y 618;
    • SAP ERP (HCM Travel Management), versiones 600, 602, 603, 604, 605, 606, 607 y 608;
    • SAP ERP Client para E-Bilanz 1.0, versión 1.0;
    • SAP Fiori Launchpad (News Tile Application), versiones 750, 751, 752, 753, 754 y 755;
    • SAP HANA Database, versión 2.0.
    • SAP Landscape Management, versión 3.0;
    • SAP NetWeaver:
      • ABAP Server y ABAP Platform, versiones 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 753 y 755;
      • AS ABAP, versiones 620, 640, 700, 710, 730, 731, 740, 750, 751, 752, 753 y 754;
      • AS ABAP (POWL test application), Versiones – 710, 711, 730, 731, 740, 750
      • Composite Application Framework, versiones 7.20, 7.30, 7.31, 7.40, 7.50;
      • DI Design Time Repository versiones 7.11, 7.30, 7.31, 7.40, 7.50;
      • Enterprise Portal (Fiori Framework Page), versiones 7.50, 7.31, 7.40;
    • SAP NetWeaver AS JAVA (P4 Protocol), versiones:
      • AS Java, versiones 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50;
      • ENGINEAPI versiones 7.10;
      • J2EE-FRMW versiones 7.10, 7.11;
      • WSRM versiones 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50;
    • SAP Process Integration (PGP Module – Business-to-Business Add On), versión 1.0;
    • SAP S4 HANA, versiones 100, 101, 102, 103, 104 y 105;
    • SAP Solution Manager y SAP Focused Run, versiones 9.7, 10.1, 10.5 y 10.7;
    • SAP UI 700, versión 2.0;
    • SAP UI, versiones 7.5, 7.51, 7.52, 7.53 y 7.54.

¿Te ha gustado?

¡Compártelo en redes sociales!

Deja una respuesta

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

Rellena este campo
Rellena este campo
Por favor, introduce una dirección de correo electrónico válida.
Tienes que aprobar los términos para continuar

Categorías

Calendario de entradas

Nuestros servicios

keyboard_arrow_up