Security Experts:

SAP Patches Critical Clickjacking Vulnerabilities

SAP released a set of monthly security updates for July 2016, which included 10 security notes, one of which was rated Hot News.

According to SAP’s advisory, the most notable vulnerability in Security Patch Day - July 2016 was a Clickjacking flaw in multiple SAP frameworks and technologies. While only one of the 10 issues patched this month was rated Hot News, 2 were High severity vulnerabilities and the rest of 7 were considered Medium risk.

In addition to the Clickjacking bug, the company resolved two denial of service flaws, two missing authorization checks, one code injection, one cross-site scripting issue, and three other vulnerabilities across its products.

The 10 SAP Security Patch Day Notes were accompanied by 26 Support Package Notes for a total of 36 vulnerabilities resolved in SAP’s products, ERPScan, a company that specializes in securing SAP business software, reveals. Of the 26 Support Package Notes, 24 were rated Medium risk and two were assessed with a Low severity rating.

As it turns out, Clickjacking dominated the Support Package Notes, as a total of 24 such vulnerabilities were patched in various SAP products. Although Clickjacking is a vulnerability type discovered 8 years ago, SAP paid attention to it only this year (while 24 such flaws are patched this month, only two SAP Security Notes addressing the issue were released before).

The Hot News vulnerability in the new set of patches is a Code injection issue in SAP Solution Manager, with a CVSS Base Score of 9.9. Successful exploitation would allow an attacker to inject and run their own code, obtain additional information, modify data, modify the system output, create new users with higher privileges, control the behavior of the system, escalate privileges by executing malicious code, and even perform a DoS attack.

The high risk issues patched this month include a denial of service vulnerability in SAP Sybase products with a CVSS Base Score of 7.5, and a Java Deserialization vulnerability in Adobe Interactive Forms, which has a CVSS Base Score or 7.3. The former was identified by ERPScan researchers, along with a Buffer overflow vulnerability in SAP Startup Service (CVSS Base Score: 6.5) and a Denial of service vulnerability in SAP Enterprise Portal: Federated Portal Network (CVSS Base Score: 4.9).

Also worth mentioning is a missing authorization check vulnerability in SAP HANA Enterprise (CVSS Base Score: 5.5), which could allow an attacker to access a service without any authorization procedures and use functionality that has a restricted access. Successful exploitation of this issue could result in information disclosure, privilege escalation, and other attacks.

Related: Five-year-old SAP Vulnerability Haunts Global Businesses

Related: SAP Patches Critical Code Injection, XSS Vulnerabilities

view counter