Advisory
On 13.08.2024 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within Kernel / Web Dispatcher.
SAP Note 3438085 addresses "[CVE-2024-33005] Missing Authorization check in SAP NetWeaver Application Server (ABAP and Java),SAP Web Dispatcher and SAP Content Server." to prevent missing authorization check with a medium risk for exploitation.
A workaround does exist, according to SAP Security Advisory team. It is advisable to implement the correction as project, the team suggests.
Missing authority checks are still the most common security defect related to authorizations in custom code. Since SAP uses an explicit authorization model, an authority checks must be coded in order to be executed. If an explicit check is not coded, all users have access. This type of vulnerability not only exists in SAP standard it also exists in customer coding. Check your custom developments for vulnerabilities that pose a risk to your systems. SecurityBridge helps detect code vulnerabilities before they are implemented in production.
Risk specification
SAP NetWeaver Application Server, SAP Web Dispatcher and SAP Content Server allow authenticated user to impersonate other users, resulting in them having the option of performing unintended actions.Solution
The missing authorization checks were added with patches for SAP NetWeaver Application Server, SAP Web Dispatcher and SAP Content Server. Circumstances exist that prevent the timely installation of a patch provided by the manufacturer. In such cases, you may consider applying the suggested workaround as a temporary or compensating mitigation: "If patching the entire kernel is not an option, replace only the icmbnd executable.It is compatible with all previous patch levels of a kernel version.Download the dw_xxx.sar archive of your kernel version.Extract dw_xxx.sar to a new folder.# SAPCAR -xvf dw_xxx.sarCopy icmbnd.new to the instance executable folder (/usr/sap/<SID>/<instance>/exe).Delete the existing icmbnd executable from the instance executable folder.Repeat the steps described in SAP Note 421359.No further restart is required after these steps.".
The advisory is valid for
- KERNEL 7.22 24
- KERNEL 7.53 36
- KERNEL 7.54 15
- KERNEL 7.77 34
- KERNEL 7.85 25
- KERNEL 7.89 16
- KERNEL 7.93 10
- KRNL64NUC 7.22 30
- KRNL64NUC 7.22EXT 30
- KRNL64UC 7.22 30
- KRNL64UC 7.22EXT 30
- KRNL64UC 7.53 36
- WEBDISP 7.22_EXT 7
- WEBDISP 7.53 15
- WEBDISP 7.54 7
- WEBDISP 7.77 14
- WEBDISP 7.85 11
- WEBDISP 7.89 7
- WEBDISP 7.93 3
- 6.5 [CVE-2024-42376] Multiple Missing Authorization Check vulnerabilities in SAP Shared Service Framework
- 4.3 [CVE-2024-41734] Missing Authorization check in SAP NetWeaver Application Server ABAP and ABAP Platform
- 4.3 [CVE-2024-39591] Missing Authorization check in SAP Document Builder
- 4.3 [CVE-2024-42373] Missing Authorization Check in SAP Student Life Cycle Management (SLcM)