CVE-2020-26837

9.1 CRITICAL

📋 TL;DR

CVE-2020-26837 is a path traversal vulnerability in SAP Solution Manager 7.2's User Experience Monitoring component that allows authenticated users to upload malicious scripts. This enables file system access, configuration modification, and service disruption. Organizations running SAP Solution Manager 7.2 with User Experience Monitoring enabled are affected.

💻 Affected Systems

Products:
  • SAP Solution Manager
Versions: 7.2
Operating Systems: All platforms running SAP Solution Manager
Default Config Vulnerable: ⚠️ Yes
Notes: Requires User Experience Monitoring component to be enabled and authenticated user access.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including sensitive data exfiltration, configuration tampering leading to business disruption, and denial of service affecting critical SAP operations.

🟠

Likely Case

Unauthorized file access exposing sensitive configuration files, partial system modification, and intermittent service disruptions affecting monitoring capabilities.

🟢

If Mitigated

Limited impact due to network segmentation, strict authentication controls, and monitoring preventing successful exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once access is obtained. Public exploit details available in security advisories.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply SAP Security Note 2983204

Vendor Advisory: https://launchpad.support.sap.com/#/notes/2983204

Restart Required: Yes

Instructions:

1. Download SAP Security Note 2983204 from SAP Support Portal. 2. Apply the note using SAP Solution Manager's maintenance tools. 3. Restart affected services. 4. Verify patch application through transaction SNOTE.

🔧 Temporary Workarounds

Disable User Experience Monitoring

all

Temporarily disable the vulnerable User Experience Monitoring component until patching can be completed.

Transaction SOLMAN_SETUP -> Configuration -> Disable User Experience Monitoring

Restrict User Privileges

all

Limit authenticated user access to only essential functions and implement least privilege principles.

Transaction PFCG -> Restrict roles for Solution Manager users

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate SAP Solution Manager from critical systems
  • Enhance monitoring for file upload activities and path traversal attempts in application logs

🔍 How to Verify

Check if Vulnerable:

Check if SAP Solution Manager version is 7.2 and User Experience Monitoring is enabled via transaction SOLMAN_SETUP.

Check Version:

Transaction SM51 -> System -> Status -> Check component versions

Verify Fix Applied:

Verify SAP Security Note 2983204 is applied using transaction SNOTE and check note status.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload activities in /usr/sap/trans directory
  • Path traversal patterns in web server logs
  • Unauthorized file access attempts in security audit logs

Network Indicators:

  • HTTP requests with directory traversal sequences to Solution Manager endpoints
  • Unusual file transfer patterns from Solution Manager servers

SIEM Query:

source="sap_logs" AND ("..\" OR "../" OR "%2e%2e") AND dest_port=80

🔗 References

📤 Share & Export