[ESNC-2039348] Multiple Critical Security Vulnerabilities in SAP GRC

Please refer to https://www.esnc.de for the original security advisory, updates and additional information.

————————————————————————

1. Business Impact

————————————————————————
According to SAP: “SAP Governance, Risk, and Compliance solutions (SAP GRC solutions) offer your organization a preventive, real-time approach to governance, risk, and compliance. Automated risk and compliance monitoring activities can help you proactively prevent risk events and compliance violations, helping you protect the value of your organization”

SAP GRC Access Control has multiple remote vulnerabilities, which allow an attacker to elevate privileges, bypass SoD restrictions and execute arbitrary programs. An attacker can also exploit these vulnerabilities remotely using RFC protocol or if SOAP-RFC is active, through https/https.

Due to the nature of the business functionality SAP GRC modules offer, we believe the issue is rather critical.

Risk Level: High

————————————————————————

2. Advisory Information

————————————————————————

— ESNC Security Advisory ID: ESNC-2039348
— CVE ID: CVE-2013-3678
— Original security advisory: https://www.esnc.de/security-advisories/security-vulnerability-in-sap-grc-access-control
— Reporting Date: 01.04.2013
— Vendor Patch Date: 11.11.2014
— Public Advisory Date: 11.11.2014
— Researcher: Ertunga Arsal & Mert Suoglu

————————————————————————

3. Vulnerability Information

————————————————————————

— Vendor: SAP
— Affected Components: SAP GRC – Access Control
— Vulnerability Class: SoD Bypass, Privilege Escalation, Remote Arbitrary Program Execution
— Vulnerable Function: /GRCPI/GRIA_USR_GET_AUTH (please refer to the SAP note for more details)
— CVSS v2 score by the vendor: 8.5 (AV:N/AC:M/AU:S/C:C/I:C/A:C)
— Remotely Exploitable: Yes
— Authentication Required: Yes
— Additional Notes: An exploit for this vulnerability is available in ESNC Security Suite – Penetration Testing Module.

————————————————————————

4. Solution

————————————————————————

ESNC Security Suite customers, which utilize its latest ruleset for Real-Time Monitoring & Fraud Detection and Prevention module have protection and mitigation capabilities for this vulnerability since April, 2013.

We recommend SAP customers to apply the security patch [SAP Note 2039348] and implement manual instructions supplied by the vendor.
More information can be found at vendor’s site:

https://service.sap.com/sap/support/notes/2039348

————————————————————————

About ESNC

————————————————————————

ESNC GmbH, Germany is an independent company specialized in SAP security audit, SAP penetration testing, ABAP security review and SAP vulnerability assessment services.

It’s flagship product ESNC Security Suite is used by many large enterprises for vulnerability scanning their SAP ABAP, Java and Hana systems, for running ABAP code security reviews, enforcing SAP security baselines and for real-time enterprise threat detection.

For more information about our products and services, please visit our web page at https://www.esnc.de

For live product demos, enterprise threat monitoring and for SAP security assessment requests

Please contact us via secure-systems [at] esnc.de.