Check Point Advisories

Update Protection against Multiple SAP Business Connector Vulnerabilities

Check Point Reference: CPAI-2006-059
Date Published: 6 Jun 2006
Severity: Medium
Last Updated: Monday 07 May, 2007
Source: CYBSEC
Industry Reference:CVE-2006-0732
CVE-2006-0731
Protection Provided by:
Who is Vulnerable? SAP SAP Business Connector 4.6
SAP SAP Business Connector 4.7
SAP Business Connector (BC) Core Fix 7 and prior
Vulnerability Description SAP Business Connector (SAP BC) is B2B application that enables communication between SAP applications (like SAP R/3) and non-SAP applications. Several vulnerabilities have been reported in the SAP BC that can allow for Phishing scams against the SAP BC administrator, disclosure of sensitive information on the server and compromise of the server.
Update/Patch AvaliableThe vendor has reportedly released fixes for the vulnerabilities. See SAP note 906401 and 908349 for details.
Vulnerability DetailsSeveral vulnerabilities affect SAP Business Connector:

1. The vulnerability is due to an input validation error in file "adapter-index.dsp" that does not properly validate the user-provided input to the "url" parameter. When a SAP BC administrator will click such a link, the attacker's web-page will be loaded inside an HTML frame. Successful exploitation of this vulnerability would result in Phishing scams against the target user.

2. The vulnerability is due to insufficient sanitization of the 'fullName' parameter that is used to view the various log files created by SAP BC. This issue can only occur when the product is installed as root/admin, and if the attacker has access to a general purpose port.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK