SAP Security

This page is dedicated to SAP Security issues that go beyond Users, Roles, Segregation of Duties and GRC. We continuously improve this section and ask you to visit often for the latest news or to subscribe to our Newsletter.

SAP Security Advisory

Please find the latest SAP Notes issued for SAP Security related issues. We urge our clients to take the time to read through all the notes upon release and act on the critical issues without delay to ensure that your data is safe.

The Business Application Security Initiative

The Business Application Security Initiative (BIZEC.org) is a non-profit organization that focuses on security defects in business applications. These applications are the responsible for processing and managing the most critical business information and processes, which turns their protection into a key subject for private, governmental and defense organizations around the globe.

To these days, many security professionals believe that ERP security is a synonym of “Segregation of Duties”. While functional security is highly important, there are many other threats which imply higher levels of risk and are not usually properly assessed. The work of BIZEC is centered on risk rather than on technical details. This enables organizations to understand the impact of application security vulnerabilities and prioritize their mitigation accordingly.

The main goals of BIZEC are:

  • Raise awareness, demonstrating that ERP security must be analyzed holistically.
  • Analyze current and future threats affecting these systems.
  • Serve as a unique central point of knowledge and reference in this subject.
  • Provide experienced feedback to global Organizations, helping them to increase the security of their business-critical information.
  • Organize events with the community to share and exchange information.

BIZEC does not endorse or recommend commercial products or services with the objective of remaining as a vendor-independent community and provide the best available information free of commercial bounds and restrictions. Visit the BIZEC website for more information

Latest security vulnerabilities SAP products

Security vulnerability feeds by http://www.cvedetails.com

Directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS in SAP NetWeaver Application Server Java 7.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the query string, as exploited in the wild in August 2017. (CVSS:5.0) (Last Update:2017-08-16)
Posted: August 7, 2017, 12:00 am
XML external entity (XXE) vulnerability in com.sap.km.cm.ice in SAP NetWeaver AS JAVA 7.5 allows remote authenticated users to read arbitrary files or conduct server-side request forgery (SSRF) attacks via a crafted DTD in an XML request, aka SAP Security Note 2387249. (CVSS:4.0) (Last Update:2017-08-10)
Posted: July 25, 2017, 12:00 am
SAP TREX 7.10 allows remote attackers to (1) read arbitrary files via an fget command or (2) write to arbitrary files and consequently execute arbitrary code via an fdir command, aka SAP Security Note 2419592. (CVSS:7.5) (Last Update:2017-07-31)
Posted: July 25, 2017, 12:00 am
Cross-site scripting (XSS) vulnerability in the DataArchivingService servlet in SAP NetWeaver Portal 7.4 allows remote attackers to inject arbitrary web script or HTML via the responsecode parameter to shp/shp_result.jsp, aka SAP Security Note 2308535. (CVSS:4.3) (Last Update:2017-07-28)
Posted: July 25, 2017, 12:00 am
Cross-site scripting (XSS) vulnerability in the ctcprotocol/Protocol servlet in SAP NetWeaver AS JAVA 7.3 allows remote attackers to inject arbitrary web script or HTML via the sessionID parameter, aka SAP Security Note 2406783. (CVSS:3.5) (Last Update:2017-08-08)
Posted: July 25, 2017, 12:00 am
disp+work 7400.12.21.30308 in SAP NetWeaver 7.40 allows remote attackers to cause a denial of service (resource consumption) via a crafted DIAG request, aka SAP Security Note 2405918. (CVSS:7.8) (Last Update:2017-07-21)
Posted: July 12, 2017, 12:00 am
SAP NetWeaver AS ABAP 7.40 allows remote authenticated users with certain privileges to cause a denial of service (process crash) via vectors involving disp+work.exe, aka SAP Security Note 2406841. (CVSS:4.0) (Last Update:2017-07-20)
Posted: July 12, 2017, 12:00 am