Skip links

Cross-Site Scripting Vulnerability Discovered in SAP S/4HANA eProcurement

A new security flaw has been identified in SAP S/4HANA’s eProcurement module, potentially exposing the system to Cross-Site Scripting (XSS) attacks. The vulnerability, tracked as CVE-2024-42378, stems from insufficient encoding of user-controlled inputs, allowing malicious scripts to be executed within the application.

Description

The vulnerability affects the eProcurement module on SAP S/4HANA. It is classified as a Reflected Cross-Site Scripting (XSS) vulnerability, which occurs due to weak encoding of user-controlled inputs. This security flaw allows attackers to inject and execute malicious scripts in the context of the application, potentially compromising user sessions and sensitive data.

The vulnerable function identified is: /SRMERP/CL_WD_INBOUND_HDLR IF_HTTP_EXTENSION~HANDLE_REQUEST

Impact

While the vulnerability does not affect the availability of the application, it can have minor impacts on confidentiality and integrity. Potential consequences include:

  1. Unauthorized access to user session data
  2. Theft of sensitive information
  3. Manipulation of application behavior
  4. Phishing attacks against application users
  5. Potential for more severe exploits if combined with other vulnerabilities

The CVSS v3.0 Base Score for this vulnerability is 6.1 out of 10, indicating a medium severity level.

Solution

SAP has addressed this vulnerability by providing patches for affected software components. To mitigate the risk, customers should implement the correction instructions or support packages referenced in the SAP Security Note.

Affected software components and versions include:

  • SAP_APPL (versions 606, 617, 618)
  • S4CORE (versions 102 to 108)

SAP recommends deactivating the corresponding obsolete coding to resolve the issue.

Proof of Concept (PoC)

While we won’t provide a full exploit, a simplified PoC for this type of vulnerability might involve:

  1. Identifying an input field or URL parameter in the eProcurement module that reflects user input
  2. Crafting a malicious payload that includes JavaScript code
  3. Submitting the payload and observing if the script executes in the application context

It’s crucial to note that attempting such actions on production systems without proper authorization is illegal and unethical.

Udemy SAP Security Course.

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series. This course will help you master SAP security fundamentals, from securing SAP environments to managing user access and addressing vulnerabilities. It is ideal for IT professionals and SAP administrators, providing practical skills to safeguard critical business assets. Whether you’re a beginner or an expert looking to deepen your SAP security knowledge, this course is perfect for you.

More to explorer

SAP Hash Cracking Techniques

Understanding Hash Cracking Hashing is a one-way encryption technique employed to ensure data integrity, authenticate information, and secure passwords alongside other sensitive

SAP Security Patch Day – September 2024

As the second Tuesday of September 2024 approaches, SAP administrators and security professionals are preparing for another crucial event: SAP Security Patch

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.