Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

[CVE-2021-42063] Cross-Site Scripting (XSS) vulnerability in SAP Knowledge Warehouse, SAP security note 3102769

Description

A security vulnerability has been discovered in the SAP Knowledge Warehouse (SAP KW). The usage of one SAP KW component within a Web browser enables unauthorized attackers to conduct XSS attacks, which might lead to disclose sensitive data.

XSS,reflected XSS, CSS, KM-KW, SAP KW, Knowledge Warehouse, security, Web browser, CVE-2021-42063

The displaying component of SAP KW did not sufficiently validate and encode input parameters, resulting in a reflected cross-site scripting issue.

Important: The security breach might also occur if you do not actively use the displaying component of SAP KW at all. Simply the existence of the component on your landscape is sufficient.

With this correction the parameters will be properly validated and encoded to prevent a successful XSS attack.

Implement the Support Packages and Patches referenced by this SAP Note.

Workaround

In case that you cannot implement the patch, you have two options for workaround:

Option 1: You may disable the vulnerable application following the documentation in “Config Tool Adding Filters – SAP Help Portal” (https://help.sap.com/viewer/0c333adb55cd4dbf8e92a5175703224c/7.5.19/en-US/47b1a4e5ac671599e10000000a42189c.html). ‘Component Name Mask’ parameter should be set as tc~km_tc*, ‘Vendor Mask’ Parameter – sap.com .

Option 2: In case the requests are routed via SAP Web Dispatcher you may add a rewrite rule to SAP Web Dispatcher to prevent from redirects.

Add the following rewrite rule to your Web Dispatcher configuration.

RegIForbiddenUrl ^/path/of/java/app.* –

If there is an existing icm/HTTP/mod_ = PREFIX=/, FILE=<…> in your setup:

  1. Add the new rule (above) to your existing rule file.
  2. Restart the Web Dispatcher or reload the file using the Web Administration UI.

Otherwise:

  1. Create a new file on the file system (for example in the profile directory) and enter the role above in that file.
  2. Add a new parameter icm/HTTP/mod_0 = PREFIX=/, FILE=.
  3. Restart the Web Dispatcher.

See the documentation for more details about request rewriting “Modification of HTTP Requests – SAP Help” (https://help.sap.com/viewer/683d6a1797a34730a6e005d1e8de6f22/202009.002/en-US/9699ed682b0d4e72b52cc73f521ed904.html).

Please assess the workaround applicability for your SAP landscape prior to implementation. Note that this workaround is a temporary fix and is not a permanent solution. SAP strongly recommends that you apply the corrections outlined in the security note, which can be done in lieu of the workaround or after the workaround is implemented.

 

Available fix and Supported packages

KM-KW_JIKS|7.30|7.30
KM-KW_JIKS|7.31|7.31
KM-KW_JIKS|7.40|7.40
KM-KW_JIKS|7.50|7.50

Affected component

KM-KW_JIKS

CVSS

Score:8.8
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploit


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/3102769

TAGS

XSS, reflected XSS, CSS, KM-KW, SAP KW, Knowledge Warehouse, security, Web browser, CVE-2021-42063

Request more details about the vulnerability

Explore More

RedRays AI for ABAP Code Security

Empowering Secure, Efficient, and Compliant SAP ABAP Development—in Real Time and Without Data Retention In today’s rapidly evolving business landscape, organizations increasingly

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.