Advisory
On 11.02.2020 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAP Mobile Platform.
SAP Note 2880993 addresses "[CVE-2020-6177] Missing XML Validation vulnerability in SAP Mobile Platform" to prevent external entity tunneling (xxe) with a medium risk for exploitation.
A workaround does exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
SAP Mobile Platform does not sufficiently validate an XML document which gives an authenticated attacker the opportunity to supply malicious input which could lead to partial denial of service.Solution
SAP Mobile Platform 3.0 SP17 PL03 was altered to completely disable Entity resolution. Circumstances exist that prevent the timely installation of a patch provided by the manufacturer. In such cases, you may consider applying the suggested workaround as a temporary or compensating mitigation: "Filter engine on IDS/IPS/firewall systems screening for bogus external entity requests.".
The advisory is valid for
- SAP_MOBILE_PLATFORM_RUNTIME 3.0
- 9.8 Potential XML External Entity Injection Vulnerability in SAP Environmental Compliance
- 9.6 [CVE-2020-26831] Missing XML Validation in SAP BusinessObjects Business Intelligence Platform (Crystal Report)
- 9.3 [CVE-2020-6238] Missing XML Validation vulnerability in SAP Commerce
- 8.7 [CVE-2021-27635] Missing XML Validation in SAP NetWeaver AS for JAVA
- 8.6 [CVE-2024-24743] XXE vulnerability in SAP NetWeaver AS Java (Guided Procedures)