[<prev] [next>] [day] [month] [year] [list]
Message-ID: <2CE16BF3-1CE0-48F6-8DD5-6C345A9AB44C@rcesecurity.com>
Date: Thu, 17 Mar 2022 13:53:10 +0000
From: "Julien Ahrens (RCE Security)" <info@...security.com>
To: "fulldisclosure@...lists.org" <fulldisclosure@...lists.org>
Subject: [FD] [CVE-2021-42063] SAP Knowledge Warehouse <= 7.50
"SAPIrExtHelp" Reflected XSS
RCE Security Advisory
https://www.rcesecurity.com
1. ADVISORY INFORMATION
=======================
Product: SAP Knowledge Warehouse
Vendor URL: https://help.sap.com/viewer/816f1f952d244bbf9dd5063e2a0e66b0/7.5.21/en-US/4dc9605e4a9d6522e10000000a15822b.html
Type: Cross-Site Scripting [CWE-79]
Date found: 2021-09-21
Date published: 2022-03-17
CVSSv3 Score: 6.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
CVE: CVE-2021-42063
2. CREDITS
==========
This vulnerability was discovered and researched by Julien Ahrens from
RCE Security.
3. VERSIONS AFFECTED
====================
SAP Knowledge Warehouse - versions 7.30, 7.31, 7.40, 7.50
4. INTRODUCTION
===============
The SAP Knowledge Warehouse (SAP KW) is the SAP Solution for all the
material used in training, documentation and handbooks.
(from the vendor's homepage)
5. VULNERABILITY DETAILS
========================
The endpoint at /SAPIrExtHelp is vulnerable to an unauthenticated
reflected Cross-Site Scripting vulnerability when user-supplied input
to the URI is processed by the web application. Since the application
does not properly validate and sanitize this input, it is possible to
place arbitrary script code onto the same page.
The following Proof-of-Concept triggers this vulnerability:
https://localhost/SAPIrExtHelp/random/%22%3e%3c%53%56%47%20%4f%4e%4c%4f%41%44%3d%26%23%39%37%26%23%31%30%38%26%23%31%30%31%26%23%31%31%34%26%23%31%31%36%28%26%23%78%36%34%26%23%78%36%66%26%23%78%36%33%26%23%78%37%35%26%23%78%36%64%26%23%78%36%35%26%23%78%36%65%26%23%78%37%34%26%23%78%32%65%26%23%78%36%34%26%23%78%36%66%26%23%78%36%64%26%23%78%36%31%26%23%78%36%39%26%23%78%36%65%29%3e.asp
6. RISK
=======
To successfully exploit this vulnerability an unauthenticated or
authenticated user must be tricked into visiting an arbitrary website
/ link.
The vulnerability can be used to temporarily embed arbitrary script
code into the context of the web interface, which offers a wide range
of possible attacks such as redirecting the user to a malicious page,
spoofing content on the page or attacking the browser and its plugins.
7. SOLUTION
===========
Update SAP Knowledge Warehouse to the latest version.
8. REPORT TIMELINE
==================
2021-09-21: Discovery of the vulnerability
2021-09-21: Contacted the vendor via their contact mail address
2021-09-21: Vendor response
2021-10-05: Requested status update from vendor
2021-10-06: Vendor acknowledges the vulnerability
2021-10-26: Requested status update from vendor
2021-10-27: Vendor states that they are still working on the issue
2021-11-04: CVE requested from SAP (responsible CNA)
2021-11-10: Vendor refuses to assign a CVE because they only assign CVEs when a security fix gets released
2021-11-10: Vendor asks not to disclose any details related to this bug by referring to their legal terms at https://wiki.scn.sap.com/wiki/display/PSR/Disclosure+Guidelines+for+SAP+Security+Advisories
2021-11-10: Complained about vendor's legal terms which hold researchers accountable for "any harm to SAP users"
2021-11-10: Asked for the release date of the patch
2021-11-10: Vendor refuses to provide the release date due to "legal perspectives"
2021-11-10: Told the vendor that I do not agree to their legal terms and therefore all future vulnerabilities will be disclosed without prior notification
2021-11-21: No vendor response
2021-11-21: Asked for a status update
2021-11-23: Vendor wants to have a phone call instead
2021-11-23: Rejected the phone call due to their squishy legal terms
2021-11-29: Vendor provides the assigned CVE-2021-42063
2021-11-29: Vendor asks not to release any details until December patch day (14th)
2021-12-13: Vendor provides information on the security note for December patch day
2021-12-13: Vendor asks for a 3-month grace period before doing the disclosure
2022-03-15: Sent notification about the upcoming public disclosure on 2022-03-17
2022-03-17: Public disclosure
9. REFERENCES
=============
https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42063
https://launchpad.support.sap.com/#/notes/3102769
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists