SAP this week released 11 Security Notes as part of the Patch Day – July 2019, one of which was a Hot News Note addressing a Critical vulnerability in Diagnostics Agent.
Tracked as CVE-2019-0330 and featuring a CVSS score of 9.1, the bug is an OS command injection that could lead to the compromise of the entire SAP system.
The Diagnostics Agent manages the monitoring and diagnostics events communications between every SAP system and Solution Manager, which allows admins to execute OS commands through a GAP_ADMIN transaction. These commands are validated using a whitelist file in the Diagnostic Agent installation directory.
The addressed vulnerability, however, allows an attacker to bypass the validation by sending a custom-crafted payload. The attacker could then gain full control over an SAP system, with access to sensitive information, the ability to change application configurations or even stop SAP services, Onapsis, which focuses on securing SAP and Oracle products, says.
With the Diagnostics Agent installed in every SAP system to perform diagnostic tasks, the entire landscape could be affected.
This month, SAP also released a High priority Security Note addressing a code injection vulnerability in ABAP Tests Modules of NetWeaver Process Integration. Tracked as CVE-2019-0328, the vulnerability has a CVSS score of 8.7.
The bug was found in the Extended Computer Aided Test Tool (eCATT), a commonly used tool to cover automatic testing in SAP business processes. The utility is used to create and execute functional testing about transactions, reports, scenarios, authorization checks, and the like.
The remaining 9 vulnerabilities addressed on the July 2019 Patch Day are Medium severity bugs: Denial of service in Commerce Cloud (CVE-2019-0322), XSS in OpenUI5 (CVE-2019-0281), XSS in Information Steward (CVE-2019-0329), XSS in ABAP (CVE-2019-0321), XSS in SAP BusinessObjects (CVE-2019-0326), Unrestricted File Upload in NetWeaver (CVE-2019-0327), Missing Authorization check in ERP HCM (CVE-2019-0325), Information disclosure in NetWeaver (CVE-2019-0318), and Content Injection in Gateway (CVE-2019-0319).