Skip links

Update 2 to Security Note 2808158 CVE-2019-0330 OS Command Injection vulnerability in SAP Diagnostics Agent, SAP security note 2839864

Description

UPDATE 14th April 2020: This note has been re-released with updated ‘Attachments’ section. The file “old_commands.xml” has been corrected.

This SAP security note replaces the corrections provided in security note 2808158 and 2823733

The OS Command Plugin in the transaction GPA_ADMIN and the OSCommand Console allow an attacker to inject code that can be executed by the application. An attacker could thereby control the behavior of the application.

Some well-known impacts of Code Injection vulnerability are

  • Unauthorized execution of commands
  • Sensitive information disclosure
  • Denial of Service

Available fix and Supported packages

  • LM-SERVICE | 7.20 | 7.20
  • SOLMANDIAG 720 | SP006 | 000012
  • SOLMANDIAG 720 | SP007 | 000014
  • SOLMANDIAG 720 | SP008 | 000012
  • SOLMANDIAG 720 | SP009 | 000003

Affected component

    SV-SMG-DIA-SRV-AGT
    Agent Framework

CVSS

Score: 9.1
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/2839864

TAGS

#Command-Injection
#OS-command-injection-GPA_ADMIN
#&160-CVE-2019-0330