Security Experts:

Connect with us

Hi, what are you looking for?


Application Security

SAP Patches Serious Flaws in Database Management Product

Alongside Microsoft and Adobe, SAP released this week its monthly security updates to address a total of 19 vulnerabilities, including three high severity issues.

Alongside Microsoft and Adobe, SAP released this week its monthly security updates to address a total of 19 vulnerabilities, including three high severity issues.

The September 2016 Patch Day fixes include 11 security notes, 3 updates to previous notes, and 5 support package notes. Three of the flaws they resolve have been rated “high,” while the rest are considered “medium.”

Many of the vulnerabilities are missing authorization checks, which is one of the most common type of problems found in SAP products, but the patches also address information disclosure, denial-of-service (DoS), cross-site scripting (XSS) and SQL injection issues.

According to ERPScan, a company that specializes in protecting SAP and Oracle business-critical enterprise resource planning (ERP) systems, two of the three most severe vulnerabilities affect SAP Adaptive Server Enterprise (ASE), a relational model database management product.

The security holes are SQL injection flaws that allow attackers to execute specially crafted SQL queries.

“[ASE] stores all sensitive and valuable corporate data. It would be no exaggeration to say that the SAP ASE database is a treasure trove for hackers,” ERPScan wrote in a blog post.

“Both closed vulnerabilities are SQL Injections. It means that an authenticated user on the following SAP ASE server versions may be able to create and execute a stored procedure with SQL commands. This allows the attacker to elevate their privileges, modify database objects, or execute commands they are not authorized to execute,” the company explained.

The third most serious issue patched this month is a DoS vulnerability affecting the SAP Business Objects BI Launchpad product.

A report published by ERPScan last month revealed that, through June 2016, SAP had issued more than 3,660 security notes and support package notes to address thousands of vulnerabilities.

Security firm Onapsis reported that some of these vulnerabilities affected more than 10,000 of SAP’s customers. In May, Onapsis warned that up to 36 global businesses had been hacked through a SAP product flaw that was patched five years ago.

Related: SAP Patches Critical Code Injection, XSS Vulnerabilities

Related: SAP Patches Critical Clickjacking Vulnerabilities

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.

Application Security

Many developers and security people admit to having experienced a breach effected through compromised API credentials.

Application Security

A new report finds that barely 1% of all SBOMs being generated today meets the “minimum elements” defined by the U.S. government.

Application Security

A security vulnerability identified on AliExpress, the wholesale marketplace owned by the Chinese e-commerce giant Alibaba, could have been exploited by hackers to hijack...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...