lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <558AF0FB.2070608@erpscan.com>
Date: Wed, 24 Jun 2015 21:03:39 +0300
From: Darya Maenkova <d.maenkova@...scan.com>
To: undisclosed-recipients:;
Subject: [FD] Securing SAP Systems from XSS vulnerabilities Part 2: Defense
 for SAP NetWeaver ABAP


     From the developer’s perspective

For all generic Web applications where you accept input parameters, you 
must use encoding methods provided by the ICF handler. The 
implementation of the encoding is available as an API in two variants:

•ABAP built-in function ESCAPE (available as of SAP_BASIS >= 731);

•Class implementation in CL_ABAP_DYN_PRG.

In releases higher or equal to SAP NetWeaver Release 7.0 enhancement 
package 3 (SAP_BASIS >= 731), use the ABAP built-in function ESCAPE(). 
For more information, see the ABAP keyword documentation for the 
ESCAPE() function.

HTML / XML

	

out = escape(val = val format = cl_abap_format=>e_xss_ml).

JavaScript

	

out = escape(val = val format = cl_abap_format=>e_xss_js)

URL

	

out = escape(val = val format = cl_abap_format=>e_xss_url)

CSS

	

out = escape(val = val format = cl_abap_format=>e_xss_css)

For lower releases (SAP_BASIS 702, 720 and below), there is an ABAP OO 
implementation. The implementation is in class CL_ABAP_DYN_PRG.

Context

	

Method

HTML / XML

	

out = CL_ABAP_DYN_PRG=>ESCAPE_XSS_XML_HTML(val)

JavaScript

	

out = CL_ABAP_DYN_PRG=>ESCAPE_XSS_JAVASCRIPT(val)

URL

	

out = CL_ABAP_DYN_PRG=>ESCAPE_XSS_URL(val)

CSS

	

out = CL_ABAP_DYN_PRG=>ESCAPE_XSS_CSS(val)

For more information about the delivery of these extensions, see SAP 
Security Note 1582870 [4].


      For WebDynpro ABAP

For WebDynpro ABAP, you do not have to care about XSS at all. The 
security is ensured through the framework itself.


      For Business Server Pages (BSP)

For BSP, you should use the page directives. For more information, see 
SAP Security Note 1600317 [5] and SAP Security Note 1638779 [6]. These 
BSP page attributes have the advantage that the BSP framework ensures 
that the most secure version of encoding is used.

For BSP, you should use the page directives: /<%@...e language="abap" 
forceEncode="html|url|javascript|css"%> /

After importing SAP Security Note 1600317 [7], the existing page 
directives also use the updated BSP compiler that supports HTML encoding 
of all print statements on the page.

In the following example, all print statements use HTML encoding. It 
only affects print statements on BSP pages and does not have anything to 
do with tag parameter passing that uses the same syntax, but has 
different semantics.

BSP example:

<%@...e language="abap" forceEncode="html"%>

<html><body><form>

<% data: inputvalue type string.

inputvalue = request->get_form_field( 'x' ).

%>

<input type=text name=x value="<%=inputvalue%>">

<input type=submit>

</form></body></html>

The global page attribute defines the default encoding used within the 
page and all included page fragments. Besides the global page 
attributes, you can use the following notations for controlling the 
encoding behavior of a special print event (overriding the global 
settings):

•<%html=...%>: HTML encoding

•<%url=...%>: URL encoding for parameter names or values of URLs

•<%javascript=...%>: JavaScript encoding

•<%css=…%> : CSS encoding

•<%raw=...%> (no encoding, that is, a global encoding that was set in 
the page directive is switched off)

Using forceEncode within a page directive in a page fragment has no 
effect. The encoding within page fragments is always controlled by the 
including page.


        For BSP Online Text Repository (OTR)

One aspect that is similar to an XSS attack is a translation-related 
change that breaks the HTML or JavaScript code.//

Example: <script>

var msg = '<otr>Hello</otr>';

</script>

<input name=xyz value="<otr>Replace 'dog' with 'cat'</otr>">

Therefore, there is an extra page attribute that you can set. When this 
attribute is set, all OTR texts are effectively encoded directly after 
they have been retrieved in their language-dependent form.

For BSP ORT, you should use the page directives:

/<%@...e language="abap" forceEncodeOtr="html|javascript"%>/HTML example

//<%@...e language="abap" forceEncodeOtr="html"%>

<script>var msg = '<otr>Hello</otr>';alert(msg);

</script>

JavaScript example

<%@...e language="abap" forceEncodeOtr="html"%>

<script>

var msg = '<%JavaScript=<otr>Hello</otr>%>';

alert(msg);

</script>


        For BSP Extensions

For the BSP HTMLB library, you must set the attribute forceEncode of the 
<htmlb:content> tag to ENABLED to switch on the internal encoding 
because it is set to disabled by default. ENABLED means that the 
extension will use an appropriate encoding depending on the context 
within a value is used:

/<htmlb:content forceEncode="ENABLED|BACKWARDS_COMPATIBLE">/

•ENABLED: This means to always encode everything. This overwrites all 
other encode attributes and they no longer have to be set;

•BACKWARDS_COMPATIBLE: This is the default value. The usual encode 
attributes are active as previously defined.

In addition, the attribute design of htmlb:content specifies the 
possible designs as a page supports. Valid values are CLASSIC, 
DESIGN2002, DESIGN2003, or DESIGN2008, or combinations separated by a 
plus (+) sign. The older designs CLASSIC and DESIGN2002 are no longer 
supported (and possibly insecure) and are therefore not to be used anymore:

/<htmlb:content forceEncode="ENABLED" design="DESIGN2003+DESIGN2008">/

If you do not specify a design, then design=CLASSIC is used. Therefore, 
we recommend overriding this default with one of the supported designs 
mentioned.


        Mixed BSP page with HTML and HTMLB tags

The attribute forceEncode of the BSP page directive @page and the 
attribute forceEncode of the HTMLB content tag are independent of each 
other. The first one controls the encoding of variables outside any 
extension, whereas the last one controls the encoding with the extension 
HTMLB. Therefore, for a mixed page using HTML in combination with BSP 
Extensions, you must set both parameters as described in the sections 
above.

<%@...e language="abap" forceEncode="html"%>

...

<htmlb:content forceEncode="ENABLED">

...

<htmlb:textView text="<%=param%>"/> (1)

<%=param%> (2)

...

</htmlb:content>

In this example, the encoding of the variable param in line (1) is 
controlled by the forceEncode attribute of the htmlb:content tag, and 
the param in line (2) is controlled by the forceEncode attribute of the 
page directive.

The BSP encoding directive <%url|html|javascript=...%> has no effect 
when passing values to attributes of extension tags and is simply ignored.

In the following example, the directive to do HTML encoding is ignored, 
instead of the htmlb tag decides internally which encoding is appropriate.

<htmlb:content forceEncode="ENABLED">

...

<htmlb:textView text="<%html=param%>"/>

...

</htmlb:content>


      For Internet Transaction Server (ITS) and HTML Business

For the Internet Transaction Server (ITS) and HTML Business, the 
following encoding functions are available:

•xss_url_escape()

•xss_html_escape()

•xss_wml_escape()

•xss_css_escape()

•xss_js_escape()


      HTML Business

When addressing values of variables using the HTML Business notation: 
that is, using back quotes (`) or the <server> delimiter, the encoding 
is controlled by the global parameters:

•~auto_html_escaping=1: globally activates encoding

•~new_xss_functions=1: globally activates the use of the updated XSS 
library

This can be overruled locally in the templates by setting the parameter 
~html_escaping_off=1/0 in order to switch off or turn on the escaping.

Where and how these parameters are specified depends on the SAP_BASIS 
release:

•For the external ITS (Release <= 6.40), maintain them in the properties 
of the Internet Service in SE80.

•For the internal ITS (Release >= 6.40), maintain them in the GUI 
properties in transaction SICF as follows:

oRelease 6.40-7.11: ~auto_html_escaping=1 and ~new_xss_functions=1 
oRelease >=7.20: ~auto_html_escaping=1

As of Release 7.20, there is no need to set the 
parameter~new_xss_functions as the updated XSS library is used in all 
cases.

You must thoroughly test the application when using this approach 
because there may be cases where the encoding is too generic and can 
lead to false encoding. In such cases, you can use set the parameter 
~html_escaping_off=”X” to deactivate the automatic encoding and manually 
call the functions named. For more information, see SAP Security Note 
1488500 [8].


      For Business HTML (BHTML)

The functions of the HTMLBusiness Template Library (for example

SAP_TemplateNonEditableField()) always properly encode and cannot be 
switched on or off. For more information, see SAP Security Note 916255 [9].


      For Manual Encoding

You can also manually encode output by using the functions named above. 
In this case, encode all output.


     From the administrator’s perspective

The administrator has to set the parameters to improve security:

•*http/security_session_timeout = 900*; Enable session timeout to 
minimize potentialattack window.

•*icf/set_HTTPonly_flag_on_cookies = 0*; Declaring a cookie as HttpOnly 
increases the security of your system because it eliminates access to 
this cookie in the Web browser from client-side scripts, applets, 
plugins, and the like. Set httpOnly flag to secure cookies and Logon 
Tickets from transmitting them into the malicious host using XSS 
vulnerability.

To change the parameter activate the RZ10 transaction, select (in the 
field Profile) necessary profile (for example DEFAULT.PFL if the 
parameter should be applied globally for the SAP system). To create, 
change or delete the parameter in a profile select <i>Extended 
maintenance</i> and press the change button. When changes are made, 
select the Copy button.


     From incident response perspective

To be able to identify the real attack happened because of the XSS 
vulnerability and also from some other web-based vulnerabilities, it is 
recommended to configure the following parameters.

•Configure */icm/HTTP/logging_0/ *parameter

oset LOGFILE valueto path_to_file

oSеt PREFIX value to “/”. If URL prefix="/"(root directory), or empty 
which means

that all HTTP requests will be logged. If prefix value equal 
"/Directory", the server will log only requests which call "/Directory" 
directory and subsequent.

oSet FILEWRAP value tooff. Old log files will be saved for future analysis

•Configure*/icm/security_log/* parameter, oset LOGFILE valueto 
path_to_fileoset VERBOSITY value to 3. To be able to save all necessary 
data inoSet FILEWRAP value to off. Old log files will be saved for 
future analysis

-- 
<https://www.linkedin.com/company/2217474?trk=ppro_cprof> 
<https://twitter.com/erpscan>

<http://erpscan.com/>

------------------------------------------------------------------------

e-mail: d.maenkova@...scan.com <mailto:d.maenkova@...scan.com>

address: 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301

phone: 650.798.5255

erpscan.com <http://erpscan.com>


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ