ID

VAR-201410-1202


CVE

CVE-2014-8312


TITLE

SAP Netweaver AS ABAP of Business Warehouse Vulnerability in which important information is obtained

Trust: 0.8

sources: JVNDB: JVNDB-2014-004933

DESCRIPTION

Business Warehouse (BW) in SAP Netweaver AS ABAP 7.31 allows remote authenticated users to obtain sensitive information via a request to the RSDU_CCMS_GET_PROFILE_PARAM RFC function. Supplementary information : CWE Vulnerability type by CWE-285: Improper Authorization ( Inappropriate authentication ) Has been identified. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and gain unauthorized access. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Onapsis Security Advisory 2014-033: SAP Business Warehouse Missing Authorization Check 1. Impact on Business ===================== By exploiting this vulnerability an authenticated attacker will be able to abuse of functionality that should be restricted and can disclose technical information without having the right access permissions. This information could be used to perform further attacks over the platform. Risk Level: Low 2. Advisory Information ======================= - - Public Release Date: 2014-10-08 - - Subscriber Notification Date: 2014-10-08 - - Last Revised: 2014-08-17 - - Security Advisory ID: ONAPSIS-2013-033 - - Onapsis SVS ID: ONAPSIS-00114 - - Researcher: Nahuel D. S\xe1nchez - - Initial Base CVSS v2: 3.5 (AV:N/AC:M/AU:S/C:P/I:N/A:N) 3. Vulnerability Information ============================ - - Vendor: SAP - - Affected Components: - SAP Netweaver AS ABAP 7.31 (Check SAP Note 1967780 for detailed information on affected releases) - - Vulnerability Class: Improper Authorization (CWE-285) - - Remotely Exploitable: Yes - - Locally Exploitable: No - - Authentication Required: Yes - - Detection Module available in Onapsis X1: Yes - - BizRisk Illustration Module available in Onapsis X1: Yes - - Original Advisory: http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-033 4. Affected Components Description ================================== SAP NetWeaver Business Warehouse is a platform that provides business intelligence, analytical, reporting and data warehousing capabilities. It is often used by companies who run their business on SAP's operational systems. BW is part of the SAP NetWeaver platform. 5. Vulnerability Details ======================== The RFC function 'RSDU_CCMS_GET_PROFILE_PARAM' does not perform any authorization check prior to retrieving the profile parameter value. 6. Solution =========== SAP has released SAP Note 1967780 which provide patched versions of the affected components. The patches can be downloaded from https://service.sap.com/sap/support/notes/1967780. Onapsis strongly recommends SAP customers to download the related security fixes and apply them to the affected components in order to reduce business risks. 7. 2014-06-10: SAP releases security patches. 2014-10-08: Onapsis notifies availability of security advisory. About Onapsis Research Labs =========================== Onapsis Research Labs provides the industry analysis of key security issues that impact business-critical systems and applications. Delivering frequent and timely security and compliance advisories with associated risk levels, Onapsis Research Labs combine in-depth knowledge and experience to deliver technical and business-context with sound security judgment to the broader information security community. About Onapsis, Inc. =================== Onapsis gives organizations the adaptive advantage to succeed in securing business-critical applications by combining technology, research and analytics. Onapsis enables every security and compliance team an adaptive approach to focus on the factors that matter most to their business ? critical applications that house vital data and run business processes. Onapsis provides technology solutions including Onapsis X1, the de-facto SAP security auditing tool which delivers enterprise vulnerability, compliance, detection and response capabilities with analytics. The Onapsis Research Labs provide subject matter expertise that combines in-depth knowledge and experience to deliver technical and business-context with sound security judgment. This enables organizations to efficiently uncover security and compliance gaps and prioritize the resolution within applications running on SAP platforms. Onapsis delivers tangible business results including decreased business risk, highlighted compliance gaps, lower operational security costs and demonstrable value on investment. For further information about our solutions, please contact us at info@onapsis.com and visit our website at www.onapsis.com. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (GNU/Linux) Comment: Onapsis Research Team iEYEARECAAYFAlQ1Q14ACgkQz3i6WNVBcDWY/QCeI9z7i+dPN5uzqebPIrFtswz7 tVgAnidtdPUOtcAvKJu9UHgUH/L6afCl =piFM -----END PGP SIGNATURE-----

Trust: 2.07

sources: NVD: CVE-2014-8312 // JVNDB: JVNDB-2014-004933 // BID: 70292 // VULMON: CVE-2014-8312 // PACKETSTORM: 128603

AFFECTED PRODUCTS

vendor:sapmodel:netweaver abapscope:eqversion:7.31

Trust: 2.4

vendor:sapmodel:netweaver business warehousescope:eqversion: -

Trust: 0.3

sources: BID: 70292 // JVNDB: JVNDB-2014-004933 // CNNVD: CNNVD-201410-581 // NVD: CVE-2014-8312

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-8312
value: LOW

Trust: 1.0

NVD: CVE-2014-8312
value: LOW

Trust: 0.8

CNNVD: CNNVD-201410-581
value: LOW

Trust: 0.6

VULMON: CVE-2014-8312
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2014-8312
severity: LOW
baseScore: 3.5
vectorString: AV:N/AC:M/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 6.8
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

sources: VULMON: CVE-2014-8312 // JVNDB: JVNDB-2014-004933 // CNNVD: CNNVD-201410-581 // NVD: CVE-2014-8312

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2014-004933 // NVD: CVE-2014-8312

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201410-581

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201410-581

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-004933

PATCH

title:SAP Security Note 1967780url:http://scn.sap.com/docs/DOC-55451

Trust: 0.8

title:SAP Netweaver AS ABAP Repair measures for information disclosure vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=209632

Trust: 0.6

title: - url:https://github.com/Live-Hack-CVE/CVE-2014-8312

Trust: 0.1

sources: VULMON: CVE-2014-8312 // JVNDB: JVNDB-2014-004933 // CNNVD: CNNVD-201410-581

EXTERNAL IDS

db:NVDid:CVE-2014-8312

Trust: 2.8

db:BIDid:70292

Trust: 2.0

db:PACKETSTORMid:128603

Trust: 1.8

db:SECUNIAid:61101

Trust: 1.7

db:JVNDBid:JVNDB-2014-004933

Trust: 0.8

db:CNNVDid:CNNVD-201410-581

Trust: 0.6

db:VULMONid:CVE-2014-8312

Trust: 0.1

sources: VULMON: CVE-2014-8312 // BID: 70292 // JVNDB: JVNDB-2014-004933 // PACKETSTORM: 128603 // CNNVD: CNNVD-201410-581 // NVD: CVE-2014-8312

REFERENCES

url:http://seclists.org/fulldisclosure/2014/oct/38

Trust: 2.8

url:http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2014-033

Trust: 1.8

url:http://www.securityfocus.com/bid/70292

Trust: 1.8

url:https://service.sap.com/sap/support/notes/1967780

Trust: 1.7

url:http://scn.sap.com/docs/doc-8218

Trust: 1.7

url:http://packetstormsecurity.com/files/128603/sap-business-warehouse-missing-authorization-check.html

Trust: 1.7

url:http://secunia.com/advisories/61101

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/96877

Trust: 1.7

url:http://www.securityfocus.com/archive/1/533645/100/0/threaded

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-8312

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-8312

Trust: 0.8

url:http://www.sap.com/solutions/technology/data-warehousing/sapnetweaver-business-warehouse/index.epx

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2014-8312

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://www.onapsis.com.

Trust: 0.1

url:https://service.sap.com/sap/support/notes/1967780.

Trust: 0.1

sources: VULMON: CVE-2014-8312 // BID: 70292 // JVNDB: JVNDB-2014-004933 // PACKETSTORM: 128603 // CNNVD: CNNVD-201410-581 // NVD: CVE-2014-8312

CREDITS

Nahuel D. Sánchez

Trust: 0.3

sources: BID: 70292

SOURCES

db:VULMONid:CVE-2014-8312
db:BIDid:70292
db:JVNDBid:JVNDB-2014-004933
db:PACKETSTORMid:128603
db:CNNVDid:CNNVD-201410-581
db:NVDid:CVE-2014-8312

LAST UPDATE DATE

2024-11-23T22:42:31.794000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2014-8312date:2022-10-06T00:00:00
db:BIDid:70292date:2015-04-13T21:01:00
db:JVNDBid:JVNDB-2014-004933date:2014-10-23T00:00:00
db:CNNVDid:CNNVD-201410-581date:2022-10-08T00:00:00
db:NVDid:CVE-2014-8312date:2024-11-21T02:18:50.460

SOURCES RELEASE DATE

db:VULMONid:CVE-2014-8312date:2014-10-16T00:00:00
db:BIDid:70292date:2014-10-08T00:00:00
db:JVNDBid:JVNDB-2014-004933date:2014-10-23T00:00:00
db:PACKETSTORMid:128603date:2014-10-08T22:22:44
db:CNNVDid:CNNVD-201410-581date:2014-10-22T00:00:00
db:NVDid:CVE-2014-8312date:2014-10-16T19:55:19.990