SAP Crystal Reports Code Execution and Data Manipulation Vulnerabilities


Description   Multiple vulnerabilities have been identified in SAP Crystal Reports, which could be exploited by attackers to manipulate or obtain certain information, cause a denial of service or execute arbitrary commands.
The first issue is caused by input validation errors in the "InfoViewApp/jsp/common/actionNav.jsp", "InfoViewApp/jsp/common/error.jsp" and "InfoViewApp/logon.jsp" scripts when processing the "actId", "backUrl" and "logonAction" parameters, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected site.
The second vulnerability is caused by design errors in the "scriptinghelpers.dll" ActiveX control which includes the insecure methods "CreateTextFile()", "LaunchProgram()", "DeleteFile()" and "Kill()", which could allow attackers to create, overwrite, or delete arbitrary files, kill processes, or execute arbitrary commands via a malicious web page.
The third issue is caused by an input validation error in the "PerformanceManagement/jsp/qa.jsp" script when handling the "path" parameter, which could allow directory traversal attacks.
     
Vulnerable Products   Vulnerable Software:
SAP Crystal Reports Server 2008
     
Solution   Apply patches (SAP notes 1458309, 1458310 and 1476930):https://service.sap.com/sap/support/notes/1458309https://service.sap.com/sap/support/notes/1458310https://service.sap.com/sap/support/notes/1476930
     
CVE  
     
References   https://service.sap.com/sap/support/notes/1458309
https://service.sap.com/sap/support/notes/1458310
https://service.sap.com/sap/support/notes/1476930
http://dsecrg.com/pages/vul/show.php?id=301
http://dsecrg.com/pages/vul/show.php?id=302
http://dsecrg.com/pages/vul/show.php?id=303
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious tag with event found in data
3.2.0
Misc : Directory traversal - parameter starting with ../
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - POST : suspicious 'object' tag found in data
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
3.2.0
XSS - Prevention - POST : 'location' javascript object found in data
3.2.0
Directory traversal using ..\..
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - POST : javascript code found in data
3.2.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
3.2.0
XSS - Prevention - POST : code allowing cookie access found in data
3.2.0
Directory traversal
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - POST : suspicious 'div' tag found in data
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
Directory traversal backward root folder
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - POST : 'script' tag found in data
3.2.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
     


 
 
 
 
 Risk level 
Critical 

 Vulnerability First Public Report Date 
2011-01-25 

 Target Type 
Client + Server 

 Possible exploit 
Local & Remote