Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 2863396
was released on
14.04.2020 and deals with
"[CVE-2020-6227] Remote unauthenticated log injection in SAP Business Objects Business Intelligence Platform (CMS / Auditing issues)" within BI/BO platform.
We advice you to follow the instructions, to resolve
log injection
with a
medium potential for exploitation
in component BI-BIP-SRV.
According to SAP Security Advisory team a workaround does not exist. It is advisable to implement the correction as part of maintenance.
Risk specification
SAP BusinessObjects Business Intelligence Platform allows an attacker to create additional entries in the log files by sending specially crafted GIOP packets.Solution
SAP BusinessObjects Business Intelligence Platform now properly sanitizes the content of the GIOP Packet, thus now longer allowing the insertion of log entries.
Affected System
SAP BusinessObjects Business Intelligence suite is an analytics platform allowing SAP customers to make better decisions based on their business data. SAP BI is a module meant for producing business insights and expands its power in combination with HANA DB and also exists as BW/4 HANA. Due to processing sensitive business data, the Data security is of utmost importance.
The advisory is valid for
- ENTERPRISE 420 87
- ENTERPRISE 430 75
- 5.3 [CVE-2023-31405] Log Injection vulnerability in SAP NetWeaver AS for Java (Log Viewer)
- 5.3 Update 1 to Security Note 3324732: [CVE-2023-31405] Log Injection vulnerability in SAP NetWeaver AS for Java (Log Viewer)
- 4.9 [CVE-2023-36924] Log Injection vulnerability in SAP ERP Defense Forces and Public Security