{"id":53890,"date":"2024-11-14T11:22:38","date_gmt":"2024-11-14T10:22:38","guid":{"rendered":"https:\/\/www.usd.de\/?p=53890"},"modified":"2024-11-14T11:55:19","modified_gmt":"2024-11-14T10:55:19","slug":"security-advisories-autumn-2024","status":"publish","type":"post","link":"https:\/\/www.usd.de\/en\/security-advisories-autumn-2024\/","title":{"rendered":"Security Advisories on SAP, Atlassian, Contao, Metaways Infosystems, Oveleon, PebbleRoad und Webswing"},"content":{"rendered":"\n<p>The <a href=\"https:\/\/herolab.usd.de\/en\/our-experts\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/our-experts\/\" target=\"_blank\" rel=\"noopener\">pentest professionals<\/a> at <a href=\"https:\/\/herolab.usd.de\/en\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/\" target=\"_blank\" rel=\"noopener\">usd HeroLab<\/a> examined SAP, Atlassian, Contao, Metaways Infosystems, Oveleon, PebbleRoad and Webswing during their <a href=\"https:\/\/www.usd.de\/en\/pentest\/\" data-type=\"link\" data-id=\"https:\/\/www.usd.de\/en\/pentest\/\">pentests<\/a>.Thereby, several vulnerabilities were identified in the various applications.<\/p>\n\n\n\n<p>The vulnerabilities were reported to the vendors as part of the <a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noopener\">Responsible Disclosure Policy<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">SAP Business Connector &amp; SAP Fiori<\/h3>\n\n\n\n<p>Several cross-site scripting vulnerabilities were identified in SAP Business Connector. Attackers were able to execute JavaScript in the context of other users.<\/p>\n\n\n\n<p>Vulnerabilities were discovered in SAP Fiori that allowed attackers to gain unauthorized access to business travel data and authorize arbitrary individuals to approve vacation requests.<\/p>\n\n\n\n<figure class=\"wp-block-table is-style-regular\"><table><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">ID<\/th><th class=\"has-text-align-center\" data-align=\"center\">Product<\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Vulnerability Type<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0004\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0004\/\" target=\"_blank\" rel=\"noopener\">usd-2024-0004<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">SAP Business Connector<\/td><td class=\"has-text-align-center\" data-align=\"center\">Improper Neutralization of Input During Web Page Generation <br>(CWE-79 'Stored Cross-site Scripting')<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0003\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0003\/\" target=\"_blank\" rel=\"noopener\">usd-2024-0003<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">SAP Business Connector<\/td><td class=\"has-text-align-center\" data-align=\"center\">Improper Neutralization of Input During Web Page Generation (CWE 79 - 'Reflected Cross-site Scripting')<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0042\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0042\/\" target=\"_blank\" rel=\"noopener\">usd-2023-0042<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">SAP Fiori<\/td><td class=\"has-text-align-center\" data-align=\"center\">CWE-284: Improper Access Control<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0040\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0040\/\" target=\"_blank\" rel=\"noopener\">usd-2023-0040<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">SAP Fiori<\/td><td class=\"has-text-align-center\" data-align=\"center\">CWE-862: Missing Authorization<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Security Advisories on SAP<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Contao &amp; Oveleon<\/h3>\n\n\n\n<p>The vulnerabilities found in Contao allowed attackers with access to the backend of Contao to list files on the underlying system and upload any file, which could then be executed on the web server.<\/p>\n\n\n\n<p>A cross-site scripting vulnerability was identified in the cookiebar for Contao developed by Oveleon. This made it possible for attackers to execute JavaScript in the context of other users.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">ID<\/th><th class=\"has-text-align-center\" data-align=\"center\">Product<\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Vulnerability Type<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0013\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0013\/\" target=\"_blank\" rel=\"noopener\">usd-2024-0013<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Contao CMS<\/td><td class=\"has-text-align-center\" data-align=\"center\">Unrestricted Upload of File with Dangerous Type (CWE-434)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2024-0003\/\" target=\"_blank\" rel=\"noopener\"><\/a><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0012\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0012\/\" target=\"_blank\" rel=\"noopener\">usd-2024-0012<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Contao CMS<\/td><td class=\"has-text-align-center\" data-align=\"center\">Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22)<\/td><\/tr><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0042\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2023-0042\/\" target=\"_blank\" rel=\"noopener\">usd-2024-0009<\/a><a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2023-0042\/\" target=\"_blank\" rel=\"noopener\"><\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Oveleon<\/td><td class=\"has-text-align-center\" data-align=\"center\">CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Security Advisories on Contao und Oveleon<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Metaways Infosystems<\/h3>\n\n\n\n<p>The identified vulnerability in Tine Groupware allowed unauthenticated attackers to gain access to login data if LDAP was used for user authentication.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">ID<\/th><th class=\"has-text-align-center\" data-align=\"center\">Product<\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Vulnerability Type<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2024-0013\/\" target=\"_blank\" rel=\"noopener\"><\/a><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0005\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0005\" target=\"_blank\" rel=\"noopener\">usd-2024-0005<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Tine<\/td><td class=\"has-text-align-center\" data-align=\"center\">Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Security Advisories on Metaways<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Atlassian<\/h3>\n\n\n\n<p>The vulnerability in Jira Cloud allowed system commands to be included in CSV files. Low privileged attackers could insert potentially malicious code into exported CSV files.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">ID<\/th><th class=\"has-text-align-center\" data-align=\"center\">Product<\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Vulnerability Type<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2024-0013\/\" target=\"_blank\" rel=\"noopener\"><\/a><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0005\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0005\" target=\"_blank\" rel=\"noopener\">usd-2024-0007<\/a><a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2024-0005\" target=\"_blank\" rel=\"noopener\"><\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Jira Cloud<\/td><td class=\"has-text-align-center\" data-align=\"center\">Improper Neutralization of Formula Elements in a CSV File (CWE 1236)<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Security Advisories on Atlassian<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">PebbleRoad<\/h3>\n\n\n\n<p>During their pentests a cross-site scripting vulnerability was found, which allows attackers to execute JavaScript code in the context of other users.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">ID<\/th><th class=\"has-text-align-center\" data-align=\"center\">Product<\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Vulnerability Type<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2024-0005\" target=\"_blank\" rel=\"noopener\"><\/a><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0011\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0011\/\" target=\"_blank\" rel=\"noopener\">usd-2024-0011<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Glossarizer<\/td><td class=\"has-text-align-center\" data-align=\"center\">Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Security Advisories zu PebbleRoad<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Webswing<\/h3>\n\n\n\n<p>A vulnerability that was found in Webswing enabled attackers to overwrite any file on the underlying system and ultimately execute their own code on the system.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th class=\"has-text-align-center\" data-align=\"center\">ID<\/th><th class=\"has-text-align-center\" data-align=\"center\">Product<\/th><th class=\"has-text-align-center\" data-align=\"center\"><strong>Vulnerability Type<\/strong><\/th><\/tr><\/thead><tbody><tr><td class=\"has-text-align-center\" data-align=\"center\"><a href=\"https:\/\/herolab.usd.de\/security-advisories\/usd-2024-0011\/\" target=\"_blank\" rel=\"noopener\"><\/a><a href=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0008\/\" data-type=\"link\" data-id=\"https:\/\/herolab.usd.de\/en\/security-advisories\/usd-2024-0008\/\" target=\"_blank\" rel=\"noopener\">usd-2024-0008<\/a><\/td><td class=\"has-text-align-center\" data-align=\"center\">Webswing<\/td><td class=\"has-text-align-center\" data-align=\"center\">Relative Path Traversal (CWE-23)<\/td><\/tr><\/tbody><\/table><figcaption class=\"wp-element-caption\">Security Advisory on Webswing<\/figcaption><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About usd HeroLab Security Advisories<\/h2>\n\n\n\n<p>In order to protect businesses against hackers and criminals, we must ensure that our skills and knowledge are up to date at all times. Therefore, security research is just as important to our work as is building up a security community to promote an exchange of knowledge. After all, more security can only be achieved if many people take on the task.<\/p>\n\n\n\n<p>We analyze attack scenarios, which are changing constantly, and publish a series of Security Advisories on current vulnerabilities and security issues \u2013 always in line with our&nbsp;<a href=\"https:\/\/herolab.usd.de\/en\/responsible-disclosure\/\" target=\"_blank\" rel=\"noreferrer noopener\">Responsible Disclosure Policy<\/a>.<\/p>\n\n\n\n<p>Always in the name of our mission: \u201cmore security.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The pentest professionals at usd HeroLab examined SAP, Atlassian, Contao, Metaways Infosystems, Oveleon, PebbleRoad and Webswing during their pentests.Thereby, several vulnerabilities were identified in the various applications. The vulnerabilities were reported to the vendors as part of the Responsible Disclosure Policy. SAP Business Connector &amp; SAP Fiori Several cross-site scripting vulnerabilities were identified in SAP [&hellip;]<\/p>\n","protected":false},"author":117,"featured_media":46998,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"categories":[373,1674,10757],"tags":[11405,11406,11407,11408,11409,8540,11410,380,487,381,11411],"class_list":["post-53890","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-en","category-security-advisories-en","category-usd-herolab-en","tag-atlassian-en","tag-contao-en","tag-metaways-en","tag-oveleon-en","tag-pebbleroad-en","tag-sap-en","tag-sap-fiori-en","tag-security-advisories-en","tag-security-analysis-en","tag-security-research-en","tag-webswing-en"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/53890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/117"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=53890"}],"version-history":[{"count":5,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/53890\/revisions"}],"predecessor-version":[{"id":53942,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/posts\/53890\/revisions\/53942"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/46998"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=53890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/categories?post=53890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/tags?post=53890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}