Description
Symptom
A security vulnerability has been discovered in the SAP Knowledge Warehouse (SAP KW). The usage of one SAP KW component within a Web browser enables unauthorized attackers to conduct XSS attacks, which might lead to disclose sensitive data.
Other Terms
XSS,reflected XSS, CSS, KM-KW, SAP KW, Knowledge Warehouse, security, Web browser, CVE-2021-42063
Reason and Prerequisites
The displaying component of SAP KW did not sufficiently validate and encode input parameters, resulting in a reflected cross-site scripting issue.
Important: The security breach might also occur if you do not actively use the displaying component of SAP KW at all. Simply the existence of the component on your landscape is sufficient.
Solution
With this correction the parameters will be properly validated and encoded to prevent a successful XSS attack.
Implement the Support Packages and Patches referenced by this SAP Note.
Workaround
In case that you cannot implement the patch, you have two options for workaround:
Option 1: You may disable the vulnerable application following the documentation in “Config Tool Adding Filters – SAP Help Portal” (https://help.sap.com/viewer/0c333adb55cd4dbf8e92a5175703224c/7.5.19/en-US/47b1a4e5ac671599e10000000a42189c.html). ‘Component Name Mask’ parameter should be set as tc~km_tc*, ‘Vendor Mask’ Parameter – sap.com .
Option 2: In case the requests are routed via SAP Web Dispatcher you may add a rewrite rule to SAP Web Dispatcher to prevent from redirects.
Add the following rewrite rule to your Web Dispatcher configuration.
RegIForbiddenUrl ^/path/of/java/app.* –
If there is an existing icm/HTTP/mod_ = PREFIX=/, FILE=<…> in your setup:
- Add the new rule (above) to your existing rule file.
- Restart the Web Dispatcher or reload the file using the Web Administration UI.
Otherwise:
- Create a new file on the file system (for example in the profile directory) and enter the role above in that file.
- Add a new parameter icm/HTTP/mod_0 = PREFIX=/, FILE=.
- Restart the Web Dispatcher.
See the documentation for more details about request rewriting “Modification of HTTP Requests – SAP Help” (https://help.sap.com/viewer/683d6a1797a34730a6e005d1e8de6f22/202009.002/en-US/9699ed682b0d4e72b52cc73f521ed904.html).
Please assess the workaround applicability for your SAP landscape prior to implementation. Note that this workaround is a temporary fix and is not a permanent solution. SAP strongly recommends that you apply the corrections outlined in the security note, which can be done in lieu of the workaround or after the workaround is implemented.
Available fix and Supported packages
Affected component
KM-KW_JIKS
CVSS
Score:8.8
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Exploit
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/3102769