Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

CVE-2020-26837 Multiple Vulnerabilities in SAP Solution Manager 7.2 (User Experience Monitoring), SAP security note 2983204

Description

This SAP security note addresses multiple vulnerabilities identified in SAP Solution Manager 7.2 (User Experience Monitoring). The vulnerability details along with their CVE relevant information can be found below

1.Path Traversal

An authenticated non-administrative user of SAP Solution Manager 7.2 (User Experience Monitoring) can deploy a malicious script which can exploit an existing path traversal vulnerability to fully compromise confidentiality exposing elements of the file system and partially compromise availability by making certain services unavailable

  • CVE-2020-26837
  • CVSS Score: 8.5; CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L

2.Missing Authorization check

SAP Solution Manager 7.2 (User Experience Monitoring) does not perform necessary authorization checks for an authenticated user. Due to inadequate access control, a network attacker authenticated as a regular user can use operations which should be restricted to administrators. These operations can be used to deploy a malicious User Experience Monitoring script.

  • CVE-2020-26830
  • CVSS Score: 7.6; CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L

These issues are relevant for all the customers using SAP Solution Manager 7.2 with LM-SERVICE 7.20 deployment.

Available fix and Supported packages

  • LM-SERVICE | 7.20 | 7.20
  • SOLMANDIAG 720 | SP003 | 000008
  • SOLMANDIAG 720 | SP004 | 000017
  • SOLMANDIAG 720 | SP005 | 000019
  • SOLMANDIAG 720 | SP006 | 000019
  • SOLMANDIAG 720 | SP007 | 000026
  • SOLMANDIAG 720 | SP008 | 000024
  • SOLMANDIAG 720 | SP009 | 000018
  • SOLMANDIAG 720 | SP010 | 000009
  • SOLMANDIAG 720 | SP011 | 000005

Affected component

    SV-SMG-MON-EEM
    End User Experience Monitoring

CVSS

Score: 8.5
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2983204

TAGS

#Access-control
#Authorization-error
#Path-Traversal
#User-Experience-Monitoring
#SAP-Solution-Manager-7.2
#CVE-2020-26837&160
#CVE-2020-26830

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,