Advisory
SAP takes the security of its vast product portfolio very seriously and thus releases security fixes for
vulnerabilities reported by external researchers and their customers every second Tuesday of the month.
SAP Note 2917275
was released on
12.05.2020 and deals with
"[CVE-2020-6248] Code injection in SAP Adaptive Server Enterprise (Backup Server)" within SAP Adaptive Server Enterprise (ASE) .
We advice you to follow the instructions, to resolve
code injection
with a
hot news potential for exploitation
in component BC-SYB-ASE.
According to SAP Security Advisory team a workaround exists. It is advisable to implement the correction as part of maintenance.
Risk specification
SAP Adaptive Server Enterprise (ASE) Backup Server does not perform the necessary validation checks for an authenticated user while executing DUMP or LOAD command allowing arbitrary code execution or Code Injection.Solution
The application input validation checks have been updated to prevent this type of attack. Alternativly, the consulting team has proposed the following: "Mitigation: A potential attacker requires to be the Database Owner (dbo) or a user with dump/load database privilege.". The suggestion may be considered, as a workaround or compensating mitigation. We recommend installing/applying the correction wherever possible and as soon as possible. Base your decision on whether or not to apply the patch on your companies and systems risk perspective and consider the provided CVSS 9.1 score.
- 9.9 [CVE-2021-21466] Code Injection in SAP Business Warehouse and SAP BW/4HANA
- 9.9 [CVE-2022-41203] Insecure Deserialization of Untrusted Data in SAP BusinessObjects Business Intelligence Platform (Central Management Console and BI Launchpad)
- 9.9 [CVE-2021-27602] Remote Code Execution vulnerability in Source Rules of SAP Commerce
- 9.1 [CVE-2020-26808] Code Injection in SAP AS ABAP and S/4 HANA (DMIS)
- 9.1 [CVE-2020-6318] Code Injection vulnerability in SAP NetWeaver (ABAP Server) and ABAP Platform