Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

[CVE-2024-33003] Information Disclosure Vulnerability in SAP Commerce Cloud

A significant security flaw has been uncovered in SAP Commerce Cloud, potentially exposing customers’ personal information. The vulnerability, identified as CVE-2024-33003, allows sensitive data to be included in URL parameters of certain API endpoints, posing a serious risk to user privacy and security.

Description

The vulnerability affects multiple OCC API endpoints in SAP Commerce Cloud. These endpoints inadvertently include Personally Identifiable Information (PII) such as passwords, email addresses, mobile numbers, and coupon codes in the request URL as query or path parameters. This design flaw could lead to unintended information disclosure, as HTTP servers and proxies commonly log URL parameters.

Impact

The potential impact of this vulnerability is severe. It could lead to:

1. Unauthorized access to user credentials and personal information
2. Compromise of customer accounts
3. Potential for large-scale data breaches
4. Loss of customer trust and potential legal implications
5. Violation of data protection regulations such as GDPR

Solution

SAP has addressed this vulnerability by:

1. Releasing new variants of the affected OCC API endpoints that pass confidential data through request body parameters only
2. Deprecating the old, vulnerable OCC API endpoints
3. Providing patches: SAP Commerce Patch Release 2205.28 and SAP Commerce Cloud Update Release 2211.28

Customers are strongly advised to update their systems to the latest patch release. For those unable to immediately apply the patches, SAP has provided a temporary workaround involving modifications to client-side code.

Proof of Concept (PoC)

While it’s not advisable to demonstrate a full exploit, a simplified PoC could involve:

1. Identifying a vulnerable endpoint, such as:
`https://{server}/occ/v2/swagger-ui/index.html#/Users/replaceUserPassword`

2. Crafting a request that includes sensitive data in the URL:
`PUT https://{server}/occ/v2/{baseSiteId}/users/current/password?newPassword=SecretPass123`

3. Examining server logs or intercepting the request to demonstrate that the password is visible in plain text

This PoC highlights the importance of secure API design and the need for constant vigilance in protecting user data. As digital commerce continues to grow, ensuring the security of e-commerce platforms remains paramount for maintaining customer trust and complying with data protection regulations.

Explore More

RedRays AI for ABAP Code Security

Empowering Secure, Efficient, and Compliant SAP ABAP Development—in Real Time and Without Data Retention In today’s rapidly evolving business landscape, organizations increasingly

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.