[ERPSCAN-17-018] SAP NetWeaver AS Java 7.5 XXE in com.sap.km.cm.ice

Application: SAP NetWeaver AS Java
Versions Affected: SAP NetWeaver AS Java 7.5
Vendor URL: SAP
Bugs: XXE
Reported: 17.06.2016
Vendor response: 18.06.2016
Date of Public Advisory: 11.04.2017
Reference: SAP Security Note 2387249
Author: Mathieu Geli (ERPScan)

VULNERABILITY INFORMATION

Class: XXE
Impact: File disclosure, network discovery
Remotely Exploitable: yes
Locally Exploitable: no
CVE Name: CVE-2017-11457

CVSS Information

CVSS v3 Base Score: 4.9 / 10
CVSS v3 Base Vector:

AV: Attack Vector (Related exploit range) Network (N)
AC: Attack Complexity (Required attack complexity) Low (L)
PR: Privileges Required (Level of privileges needed to exploit) High(H)
UI: User Interaction (Required user participation) None (N)
S: Scope (Change in scope due to impact caused to components beyond the vulnerable component) Unchanged (U)
C: Impact to Confidentiality None (N)
I: Impact to Integrity None (N)
A: Impact to Availability High (H)

Description

A malicious user can modify an XML-based request to include XML content that is then parsed locally.

Business risk

An attacker can use an XML external entity vulnerability to send specially crafted unauthorized XML requests, which will be processed by XML parser. The attacker can use an XML external entity vulnerability for getting unauthorized access to OS file system.

VULNERABLE PACKAGES

SAP NetWeaver 7.5
Validated on kernel 745

SOLUTIONS AND WORKAROUNDS

To correct this vulnerability, install SAP Security Note 2387249

TECHNICAL DESCRIPTION

A malicious user can modify an XML-based request to include XML content that is then parsed locally.

Proof of Concept