SAP this week released 11 Security Notes as part of the Patch Day – July 2019, one of which was a Hot News Note addressing a Critical vulnerability in Diagnostics Agent.
Tracked as CVE-2019-0330 and featuring a CVSS score of 9.1, the bug is an OS command injection that could lead to the compromise of the entire SAP system.
The Diagnostics Agent manages the monitoring and diagnostics events communications between every SAP system and Solution Manager, which allows admins to execute OS commands through a GAP_ADMIN transaction. These commands are validated using a whitelist file in the Diagnostic Agent installation directory.
The addressed vulnerability, however, allows an attacker to bypass the validation by sending a custom-crafted payload. The attacker could then gain full control over an SAP system, with access to sensitive information, the ability to change application configurations or even stop SAP services, Onapsis, which focuses on securing SAP and Oracle products, says.
With the Diagnostics Agent installed in every SAP system to perform diagnostic tasks, the entire landscape could be affected.
This month, SAP also released a High priority Security Note addressing a code injection vulnerability in ABAP Tests Modules of NetWeaver Process Integration. Tracked as CVE-2019-0328, the vulnerability has a CVSS score of 8.7.
The bug was found in the Extended Computer Aided Test Tool (eCATT), a commonly used tool to cover automatic testing in SAP business processes. The utility is used to create and execute functional testing about transactions, reports, scenarios, authorization checks, and the like.
The remaining 9 vulnerabilities addressed on the July 2019 Patch Day are Medium severity bugs: Denial of service in Commerce Cloud (CVE-2019-0322), XSS in OpenUI5 (CVE-2019-0281), XSS in Information Steward (CVE-2019-0329), XSS in ABAP (CVE-2019-0321), XSS in SAP BusinessObjects (CVE-2019-0326), Unrestricted File Upload in NetWeaver (CVE-2019-0327), Missing Authorization check in ERP HCM (CVE-2019-0325), Information disclosure in NetWeaver (CVE-2019-0318), and Content Injection in Gateway (CVE-2019-0319).
Related: SAP Patches Multiple Missing Authorization Checks
Related: PoC Exploits for Old SAP Configuration Flaws Increase Risk of Attacks
Related: SAP Releases ‘Hot News’ Security Notes on First Patch Day of 2019

More from Ionut Arghire
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- Apria Healthcare Notifying 2 Million People of Years-Old Data Breaches
- European Cybersecurity Firm Sekoia.io Raises $37.5 Million
- GitLab Security Update Patches Critical Vulnerability
- Android App With 50,000 Downloads in Google Play Turned Into Spyware via Update
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
