ID

VAR-200904-0224


CVE

CVE-2008-4830


TITLE

SAP GUI of KWEdit ActiveX Vulnerability to overwrite arbitrary files in Control

Trust: 0.8

sources: JVNDB: JVNDB-2009-005299

DESCRIPTION

Insecure method vulnerability in the KWEdit ActiveX control in SAP GUI 6.40 Patch 29 (KWEDIT.DLL 6400.1.1.41) and 7.10 Patch 5 (KWEDIT.DLL 7100.1.1.43) allows remote attackers to (1) overwrite arbitrary files via the SaveDocumentAs method or (2) read or execute arbitrary files via the OpenDocument method. SAP AG SAPgui KWEdit ActiveX control is prone to a remote code-execution vulnerability. Successfully exploiting this issue allows an attacker to execute arbitrary code in the context of the application running the affected control (typically Internet Explorer). This issue affects the following: SAPgui 6.40 Patch Level 29 with KWEDIT.DLL 6400.1.1.41 SAPgui 7.10 Patch Level 5 with KWEDIT.DLL 7100.1.1.43 Other versions may be vulnerable as well. ---------------------------------------------------------------------- Secunia is pleased to announce the release of the annual Secunia report for 2008. Other versions may also be affected. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2008-56/ SAP Note 1294913: https://service.sap.com/sap/support/notes/1294913 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . ====================================================================== 2) Severity Rating: Highly critical Impact: System compromise Where: Remote ====================================================================== 3) Vendor's Description of Software "SAP GUI is SAP's universal client for accessing SAP functionality in SAP applications such as - SAP ERP, SAP Business Suite (SAP CRM, SAP SCM and SAP PLM), SAP Business Intelligence and so on. SAP GUI functions like a browser. It gets information from the SAP server like what, where, when and how, to display contents in its window.". Product Link: https://www.sdn.sap.com/irj/sdn/sap-gui ====================================================================== 4) Description of Vulnerability Secunia Research has discovered a security issue in SAP GUI, which can be exploited by malicious people to gain knowledge of sensitive information, corrupt files, or compromise a user's system. The problem is that the bundled KWEdit ActiveX control (KWEDIT.DLL) provides the insecure method "SaveDocumentAs()", which saves an HTML document to a specified location. This can be exploited in combination with e.g. ====================================================================== 5) Solution Update to the latest versions, which reportedly set the kill-bit for the ActiveX control. ====================================================================== 6) Time Table 28/11/2008 - Vendor notified. 28/11/2008 - Vendor response. 14/01/2009 - Vendor provides patch for testing. 16/01/2009 - Vendor informed that patch prevents exploitation. 02/03/2009 - Status update requested. 02/03/2009 - Vendor provides status update. 15/04/2009 - Public disclosure. ====================================================================== 7) Credits Discovered by Carsten Eiram, Secunia Research. ====================================================================== 8) References SAP Note 1294913: https://service.sap.com/sap/support/notes/1294913 The Common Vulnerabilities and Exposures (CVE) project has assigned CVE-2008-4830 for the vulnerability. ====================================================================== 9) About Secunia Secunia offers vulnerability management solutions to corporate customers with verified and reliable vulnerability intelligence relevant to their specific system configuration: http://secunia.com/advisories/business_solutions/ Secunia also provides a publicly accessible and comprehensive advisory database as a service to the security community and private individuals, who are interested in or concerned about IT-security. http://secunia.com/advisories/ Secunia believes that it is important to support the community and to do active vulnerability research in order to aid improving the security and reliability of software in general: http://secunia.com/secunia_research/ Secunia regularly hires new skilled team members. Check the URL below to see currently vacant positions: http://secunia.com/corporate/jobs/ Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/advisories/mailing_lists/ ====================================================================== 10) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2008-56/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ======================================================================

Trust: 2.07

sources: NVD: CVE-2008-4830 // JVNDB: JVNDB-2009-005299 // BID: 34524 // PACKETSTORM: 76718 // PACKETSTORM: 76690

AFFECTED PRODUCTS

vendor:sapmodel:guiscope:eqversion:6.40

Trust: 1.6

vendor:sapmodel:guiscope:eqversion:7.10

Trust: 1.6

vendor:sapmodel:guiscope:eqversion:6.40 patch 29 and 7.10 patch 5

Trust: 0.8

vendor:sapmodel:ag sapgui patch levelscope:eqversion:7.105

Trust: 0.3

vendor:sapmodel:ag sapgui patch levelscope:eqversion:6.4029

Trust: 0.3

sources: BID: 34524 // JVNDB: JVNDB-2009-005299 // CNNVD: CNNVD-200904-336 // NVD: CVE-2008-4830

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2008-4830
value: HIGH

Trust: 1.0

NVD: CVE-2008-4830
value: HIGH

Trust: 0.8

CNNVD: CNNVD-200904-336
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2008-4830
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2009-005299 // CNNVD: CNNVD-200904-336 // NVD: CVE-2008-4830

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2009-005299 // NVD: CVE-2008-4830

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200904-336

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-200904-336

CONFIGURATIONS

sources: JVNDB: JVNDB-2009-005299

PATCH

title:SAP GUIurl:http://help.sap.com/saphelp_smehp1/helpdata/ja/4f/472e42e1ef5633e10000000a155106/content.htm

Trust: 0.8

sources: JVNDB: JVNDB-2009-005299

EXTERNAL IDS

db:NVDid:CVE-2008-4830

Trust: 2.8

db:BIDid:34524

Trust: 1.9

db:SECUNIAid:32869

Trust: 1.7

db:SECTRACKid:1022062

Trust: 1.6

db:VUPENid:ADV-2009-1043

Trust: 1.6

db:JVNDBid:JVNDB-2009-005299

Trust: 0.8

db:BUGTRAQid:20090415 SECUNIA RESEARCH: SAP GUI KWEDIT ACTIVEX CONTROL "SAVEDOCUMENTAS()" INSECURE METHOD

Trust: 0.6

db:CNNVDid:CNNVD-200904-336

Trust: 0.6

db:PACKETSTORMid:76718

Trust: 0.1

db:PACKETSTORMid:76690

Trust: 0.1

sources: BID: 34524 // JVNDB: JVNDB-2009-005299 // PACKETSTORM: 76718 // PACKETSTORM: 76690 // CNNVD: CNNVD-200904-336 // NVD: CVE-2008-4830

REFERENCES

url:http://secunia.com/secunia_research/2008-56/

Trust: 2.1

url:http://www.vupen.com/english/advisories/2009/1043

Trust: 1.6

url:http://www.securitytracker.com/id?1022062

Trust: 1.6

url:http://www.securityfocus.com/bid/34524

Trust: 1.6

url:http://secunia.com/advisories/32869

Trust: 1.6

url:http://www.securityfocus.com/archive/1/502698/100/0/threaded

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2008-4830

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2008-4830

Trust: 0.8

url:http://www.securityfocus.com/archive/1/archive/1/502698/100/0/threaded

Trust: 0.6

url:https://service.sap.com/sap/support/notes/1294913

Trust: 0.5

url:http://support.microsoft.com/kb/240797

Trust: 0.3

url:http://www.sap.com/

Trust: 0.3

url:/archive/1/502698

Trust: 0.3

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/advisories/32869/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/try_vi/request_2008_report/

Trust: 0.1

url:http://secunia.com/secunia_research/

Trust: 0.1

url:http://secunia.com/corporate/jobs/

Trust: 0.1

url:http://secunia.com/advisories/mailing_lists/

Trust: 0.1

url:https://www.sdn.sap.com/irj/sdn/sap-gui

Trust: 0.1

url:http://secunia.com/advisories/

Trust: 0.1

url:http://secunia.com/advisories/business_solutions/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2008-4830

Trust: 0.1

sources: BID: 34524 // JVNDB: JVNDB-2009-005299 // PACKETSTORM: 76718 // PACKETSTORM: 76690 // CNNVD: CNNVD-200904-336 // NVD: CVE-2008-4830

CREDITS

Carsten Eiram

Trust: 1.0

sources: BID: 34524 // PACKETSTORM: 76690 // CNNVD: CNNVD-200904-336

SOURCES

db:BIDid:34524
db:JVNDBid:JVNDB-2009-005299
db:PACKETSTORMid:76718
db:PACKETSTORMid:76690
db:CNNVDid:CNNVD-200904-336
db:NVDid:CVE-2008-4830

LAST UPDATE DATE

2024-11-23T22:50:02.037000+00:00


SOURCES UPDATE DATE

db:BIDid:34524date:2010-12-03T13:55:00
db:JVNDBid:JVNDB-2009-005299date:2012-12-20T00:00:00
db:CNNVDid:CNNVD-200904-336date:2009-04-28T00:00:00
db:NVDid:CVE-2008-4830date:2024-11-21T00:52:40.567

SOURCES RELEASE DATE

db:BIDid:34524date:2009-04-15T00:00:00
db:JVNDBid:JVNDB-2009-005299date:2012-12-20T00:00:00
db:PACKETSTORMid:76718date:2009-04-16T12:47:33
db:PACKETSTORMid:76690date:2009-04-15T21:04:55
db:CNNVDid:CNNVD-200904-336date:2009-04-16T00:00:00
db:NVDid:CVE-2008-4830date:2009-04-16T15:12:57.297