CVE-2024-42374

8.2 HIGH

📋 TL;DR

This XML injection vulnerability in SAP BEx Web Java Runtime Export Web Service allows attackers to retrieve sensitive information from SAP ADS systems and cause denial of service by exhausting XMLForm services. It affects confidentiality through data exposure and availability by making PDF rendering unavailable. Organizations using affected SAP Business Explorer components are vulnerable.

💻 Affected Systems

Products:
  • SAP Business Explorer (BEx) Web Java Runtime Export Web Service
Versions: Specific versions not publicly detailed; refer to SAP Note 3485284 for exact affected versions
Operating Systems: All platforms running affected SAP components
Default Config Vulnerable: ⚠️ Yes
Notes: Requires BEx Web Java Runtime with Export Web Service enabled; SAP ADS system integration required for full impact.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SAP ADS system data, permanent denial of PDF rendering services, and potential lateral movement within SAP landscape.

🟠

Likely Case

Information disclosure of sensitive business data and temporary unavailability of PDF generation functionality.

🟢

If Mitigated

Limited impact with proper input validation and service isolation, potentially only minor service degradation.

🌐 Internet-Facing: HIGH - Directly exposed web services accepting XML from untrusted sources are prime targets.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires understanding of SAP XMLForm services and BEx Web architecture, but XML injection is a well-known attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to SAP Note 3485284 for specific patch information

Vendor Advisory: https://me.sap.com/notes/3485284

Restart Required: Yes

Instructions:

1. Review SAP Note 3485284 for your specific SAP version. 2. Apply the security patch from SAP Support Portal. 3. Restart affected SAP services. 4. Validate XML input validation is functioning.

🔧 Temporary Workarounds

Disable Export Web Service

all

Temporarily disable the vulnerable BEx Web Java Runtime Export Web Service if not required for business operations.

Specific commands depend on SAP system configuration; consult SAP administration documentation

Implement XML Input Validation

all

Add additional XML schema validation and input sanitization at network perimeter or application layer.

Implement XML schema validation in web service configuration
Use SAP security notes for input validation best practices

🧯 If You Can't Patch

  • Implement network segmentation to isolate SAP ADS systems from untrusted networks
  • Deploy web application firewall with XML injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check SAP system version against affected versions in SAP Note 3485284 and verify BEx Web Java Runtime Export Web Service is enabled.

Check Version:

Use SAP transaction SM51 or RZ10 to check system version and component details

Verify Fix Applied:

Verify patch installation via SAP transaction SPAM/SAINT, then test XML input validation with controlled test payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML payloads to BEx Web services
  • Multiple failed XMLForm service requests
  • SAP ADS system access from unexpected sources

Network Indicators:

  • XML requests with injection patterns to Export Web Service endpoints
  • High volume of XMLForm service requests

SIEM Query:

source="sap_logs" AND (message="XMLForm" OR message="BEx Export") AND (message="error" OR message="exception")

🔗 References

📤 Share & Export