on 2021 Jun 28 9:29 AM
Hi friends,
Any solution available for SAP XXE vulnerbility issue reported in https://userapps.support.sap.com/sap/support/knowledge/en/2997100. We are using CRJ of Exclips version 2016.
in one of our penetration testing we found XXE vulnerability where we are able to inject XML in prptinfo and able to retrieve the server OS files.
"It can be seen that CRVCompositeViewState contains double-URL encoded JSON, where “prptinfo” key exists. This key contains XML string and this XML is prone to the XXE vulnerabilities. During the exploitation, attacker has to make sure that: • Special characters like % and & are double-URL encoded. • Quotes “ are escaped with \ character. In case of error based XXE exploitation, attacker does not need to generate any report (XML will be parsed before report-session checking). In order to exploit this is issue, attacker has to prepare a web server, where “test.dtd” file will be stored."
is this issue fixed in any of the new version?
Thanks
Viswa..
Request clarification before answering.
Hello, looking at the SAP note it should not affect CR for Eclipse, it's a XML issue between CR and the BOE Servers.
You can get the latest CR for Eclipse here:
https://wiki.scn.sap.com/wiki/display/BOBJ/SAP+Crystal+Reports+version+for+Eclipse+-+Downloads
If you find it is an issue then let us know and I'll have R&D look into it.
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
Hi Tammy
Thanks your time. Actually i don't have access to SAP Customer Login account to see the solution. Checking with my company are they have one.
Thanks
Viswa
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.
| User | Count |
|---|---|
| 8 | |
| 8 | |
| 7 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 2 |
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.