Skip links

[CVE-2024-33003] Information Disclosure Vulnerability in SAP Commerce Cloud

A significant security flaw has been uncovered in SAP Commerce Cloud, potentially exposing customers’ personal information. The vulnerability, identified as CVE-2024-33003, allows sensitive data to be included in URL parameters of certain API endpoints, posing a serious risk to user privacy and security.

Description

The vulnerability affects multiple OCC API endpoints in SAP Commerce Cloud. These endpoints inadvertently include Personally Identifiable Information (PII) such as passwords, email addresses, mobile numbers, and coupon codes in the request URL as query or path parameters. This design flaw could lead to unintended information disclosure, as HTTP servers and proxies commonly log URL parameters.

Impact

The potential impact of this vulnerability is severe. It could lead to:

1. Unauthorized access to user credentials and personal information
2. Compromise of customer accounts
3. Potential for large-scale data breaches
4. Loss of customer trust and potential legal implications
5. Violation of data protection regulations such as GDPR

Solution

SAP has addressed this vulnerability by:

1. Releasing new variants of the affected OCC API endpoints that pass confidential data through request body parameters only
2. Deprecating the old, vulnerable OCC API endpoints
3. Providing patches: SAP Commerce Patch Release 2205.28 and SAP Commerce Cloud Update Release 2211.28

Customers are strongly advised to update their systems to the latest patch release. For those unable to immediately apply the patches, SAP has provided a temporary workaround involving modifications to client-side code.

Proof of Concept (PoC)

While it’s not advisable to demonstrate a full exploit, a simplified PoC could involve:

1. Identifying a vulnerable endpoint, such as:
`https://{server}/occ/v2/swagger-ui/index.html#/Users/replaceUserPassword`

2. Crafting a request that includes sensitive data in the URL:
`PUT https://{server}/occ/v2/{baseSiteId}/users/current/password?newPassword=SecretPass123`

3. Examining server logs or intercepting the request to demonstrate that the password is visible in plain text

This PoC highlights the importance of secure API design and the need for constant vigilance in protecting user data. As digital commerce continues to grow, ensuring the security of e-commerce platforms remains paramount for maintaining customer trust and complying with data protection regulations.

Udemy SAP Security Course.

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series. This course will help you master SAP security fundamentals, from securing SAP environments to managing user access and addressing vulnerabilities. It is ideal for IT professionals and SAP administrators, providing practical skills to safeguard critical business assets. Whether you’re a beginner or an expert looking to deepen your SAP security knowledge, this course is perfect for you.

More to explorer

SAP Hash Cracking Techniques

Understanding Hash Cracking Hashing is a one-way encryption technique employed to ensure data integrity, authenticate information, and secure passwords alongside other sensitive

SAP Security Patch Day – September 2024

As the second Tuesday of September 2024 approaches, SAP administrators and security professionals are preparing for another crucial event: SAP Security Patch

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.