Article

ActiveX flaws plague SAP GUI

Robert Westervelt, News Director

Two critical ActiveX flaws have been discovered in EnjoySAP, German business software vendor SAP AG's new graphical user interface designed to improve the end user experience.

The discovery was made by security researcher Mark Litchfield of UK-based Next Generation Security (NGS) Software, who said the flaws could be remotely exploited by an attacker to gain access to a user's system.

"All the flaws discovered can be executed without any authentication," Litchfield said in an email exchange.

Litchfield said a boundary error exists within the kwedit.dll ActiveX control used when the GUI posts HTML coding. The flaw could result in a stack-based buffer overflow, he said.

A second boundary error within the rfcguisink.rfcguisink.1 ActiveX control when the GUI is launched can be exploited to cause a heap-based buffer overflow by passing an overly long string, Litchfield said.

Danish vulnerability clearinghouse

    Requires Free Membership to View

Secunia rated the flaws "highly critical" in its advisory.

SAP launched EnjoySAP in 2000 to update the aesthetics of the graphical interface for end users. The new interface was streamlined based on employee roles with help screens for certain processes.

Litchfield said he is unaware of the flaws being exploited in the wild. The vulnerabilities were discovered during an SAP consultancy engagement. Litchfield said he started looking for unauthenticated attacks against SAP to allow for privilege escalation and made the discovery.

SAP said the ActiveX flaws could be patched by updating to the latest version.

SAP Web Application Server

A less critical vulnerability in SAP Web Application Server was also discovered by Litchfield, which can be exploited by an attacker to cause a denial of service. In his advisory, Litchfield said the Internet Communication Manager contains an error that can be exploited by requesting an overly long, specially crafted URL.

The affected versions are SAP Web Application Server 6.x and 7.x. SAP said the vulnerability is fixed in the latest version.


There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: