SAP Security Notes Webinar-6
SAP Security Notes Webinar-6
RSECNOTE and the corresponding chapter in the EWA show a small – and old – selection of security notes only.
Do not use RSECNOTE anymore - its content is outdated and incomplete - use System Recommendations!
© 2022 SAP SE. All rights reserved. 12
Hosts of the Security Notes Webinar
ASUG
Regular schedule:
Wednesday in the week after the Patch Day
18:00-19:00 CEST = 12:00 EST = 9:00 PST
Calendar:
https://www.asug.com/events?events%5B%5D=13
56781
Regular schedule:
Thursday in the week after the patch day
15:00 - 16:00 CET
Calendar:
https://dsagnet.de/dsag-resource?id=91659&app=veranstaltungskalender
Regular schedule:
Wednesday in the week after the patch day
09:00 - 10:00 CET
Calendar:
Updates from the last SAP Security Patch Day
Preparation if the user has no access to the SAP Enterprise Support catalogue yet.
Even if the user has access to another catalogue in the SAP Learning Hub, a one-time sign up per S-User
is mandatory.
3. Within two hours, you will then receive a registration confirmation via e-mail and access to the
catalogue is granted.
How to guide: How to sign up for the SAP Learning Hub Edition for SAP Enterprise Support
© 2022 SAP SE. All rights reserved. 17
SAP Learning Hub Edition for SAP Enterprise Support
Registration | withdraw | watch a recording | find the survey
Direct access to SAP Learning Hub (Login with your S-User ID)
Find Courses: “Updates from the last SAP Security Patch Day”
or code: SUP_EBW_0650_1906
How to Guide:
Register for, withdraw and join the Meet the Expert live Session or recording
Register to course
“Updates from last SAP
Security Patch Day”
SUP_EBW_0650_1906
In case the customer forgot the S-User password, the password reset, cannot be done within
the SAP Learning Hub/ SAP SuccessFactors logon page.
The password can be reset here:
https://accounts.sap.com/ui/createForgottenPasswordMail?spId=55365985e4b07dc3abdfc16c&targetUrl=&sourceUrl
In case the access to SAP Learning Hub is still not successful and you get redirected to the
logon page again, this can be a sign for a missing sign up. → External Sign up
1. Go to https://support.sap.com
SEC104 - Security Notes, System Recommendations and Business Process Change Analyzer
http://events.sap.com/teched/en/session/13574
This sessions shows how to set up a monthly patch process based on the application System
Recommendations in SAP Solution Manager 7.1. See the integration with the usage procedure logging
(UPL) and the business process change analyzer (BPCA) to identify business processes which might
get affected by the implementation of security notes.
a) Note 1856125 - FAQ | Tools for using the Audit Information System AIS
b) Note 139418 - Logging of user actions (ABAP server) Logging
c) Note 382318 - FAQ | Function module RFC_READ_TABLE RFC
d) Note 2680888 - SAL | Report for determination of differences in event parameters SAL
e) Note 2883981 - RSAU_READ* | anonymized display of Security Audit Log data SAL
f) Note 3090132 - RSUSR200 | Addition of logon information from job management User
g) Note 3113345 - SUIM | Reporting for User Documentation User
h) Note 3150573 - SUIM | Optimization of RSUSR_AUTH_DATA_VERSION User
i) Note 3147103 - SAIS | Check of customer-specific programs Code
j) Note 3204960 - SAIS_SEARCH_APPL | Search for programs without transaction TCODE
In the display type "Full Event List", all events with reference to the log configuration change are displayed in
accordance with the selection criteria (event definitions: AUE, AUF, AUG, AUH, AUI, AUJ, EU5, and FU0).
In the display type "Show resulting changes", selected log configuration changes (event definitions AUF, AUI, AUJ,
and FU0) are displayed in accordance with the selection criteria. Log entries with identical content are
summarized:
Only the first log entry is displayed, and all further pseudo changes are suppressed.
Resulting changes
Note 2883981 provides transaction RSAU_READ_LOG_ADM which shows pseudonymized user names and terminal
names based on a generated hash code. Within a report, a user name or terminal ID is always displayed with the
same pseudonym. (The hash code changes once per week.)
Use this transaction for general administration tasks and risk analysis without having access to personal data.
You can use the report RSAU_READ_LOG_ADM for pseudonymized evaluation in a background job.
Users that are not to be pseudonymized can be defined in the productive exception list SAL_SHOW_IDENTITY.
You cave to activate and maintain this exception list in transaction SLDW or SLWD_COMPARE.
Transaction RSAU_READ_LOG is unchanged. Use it if you need access to personal data, too.
In the authorization concept, the two tools are distinguished by the required start authorization for authorization
object S_TCODE.
Check is active
but no
additional SAL
logging is
required.
The SUIM report RSUSR200 might not show the expected last logon date for users which are running job
steps.
Such events do not update the last logon timestamps.
The correction of this note provides a checkbox for displaying the last logon of job users on the selection
screen. If the option is selected, the result list contains additional columns with the time a user was last used
in a job step.
In addition, you get the new transaction / report SAIS_JOB_USER which provides an overview of job steps
restricted to the logon client. The report supports navigation for user details, job details, and ABAP programs
or classes started in the job step. (This reports replaces an analysis based on the very simple usage of
transaction SE16 for view V_OP.)
Available via Support Package as of 7.40 or implementation via note (which require some more prerequisite
notes and a manual implementation step)
© 2022 SAP SE. All rights reserved. 80
f) Note 3090132 - RSUSR200 | Addition of logon information from job
management
Report RSUSR200
You can add a description to users and log documentation about changes in transaction SU01.
Using note 3113345 you get transaction/report SUIM_SHOW_USDOCU which shows this information in list
and print format.
When you want to analyze the history of authorization data in roles you might start identifying
changed roles using the SUIM transaction / report RSSCD100_PFCG.
However, the result seems to be incomplete if the role was imported via a transport – which is
standard for production systems.
In addition to the history resulting from the change documents, the report now also displays
the times of imports and their transport requests. You can navigate to a transport request.
Transaction ROLE_VERS
(=report RSUSR_AUTH_DATA_VERSION)
© 2022 SAP SE. All rights reserved. 86
i) Note 3147103 - SAIS | Check of customer-specific programs
One aim during an audit is to ensure that customer or partner programs do not impede seamless change
tracking in SAP standard tables.
Note 3147103 provides the transaction / report SAIS_CODE_SCAN as part of the Audit Information System.
The report supports the check of customer-specific programs and ABAP classes with regard to direct changing
accesses to database tables.
The provided results list contains forward navigation to the found source code point in question, the last
transport request, and the option of double-clicking on the text field to store your own comments for each
object.
Available via Support Package as of 7.40 (implementation via note requires manual creation of database
table)
You want to identify reports to which no transaction has yet been assigned.
Use the additional option in the application SAIS_SEARCH_APPL to start the search for directly startable
programs without an assigned transaction.
© 2022
2022-07 SAP SE. All rights reserved. 94
How to download the SAP Security Patch Day Blog
https://dam.sap.com/mac/app/e/pdf/preview/embed/ucQrx6G?ltr=a&rc=10
Environment:
You are using certificates to authenticate a SAP support user for following support
connections:
SAP has established and operates a new dedicated PKI to allow Secure Network Connections (SNC)
and Single Sign On (SSO) to access customer systems remotely. This CA only issues temporary
generated certificates for the user SAPSUPPORT with a validity of 8 hours.
This new secure remote access scenario is part of the SAP standard support package and eliminates
maintaining the target user credentials in the Customer Remote Logon Depot.
© 2022
2022-07 SAP SE. All rights reserved. 96
Note 3219457 - Call to action: Urgent update of the SSO certificate
for SAP Support users
The current used "SAPSUPPORT User Sub CA" certificate will expire August 1st, 2022!
The current used "SAPSUPPORT Root CA" certificate will expire August 1st, 2027
➢ Import the sub CA certificate SAPSUPPORT User Sub CA into both PSE stores SNC
SAPCryptolib (for SAPGUI) and SSL-Server Standard (for HTTP connections)
© 2022
2022-07 SAP SE. All rights reserved. 97
Note 2726124 - Missing Authorization Check in multiple
components under SAP Automotive Solutions
New authorization check for V_VBAK_VKO, V_VBAK_AAT (and some restrictions concerning
external remote calls for internal functions) in various remote enabled function modules of
ECC-DIMP / S4CORE
→ No action required now (assuming you already got the Support Package)
© 2022
2022-07 SAP SE. All rights reserved. 98
Notes 3221288 3213279 3203079 3194361 3169239 3167430
Vulnerabilities in SAP BusinessObjects
Note 3213279 just show an Support Package Patch for release 4.2 (yes, that is correct for this note)
Notes 3203079, 3194361, 3169239 and 3167430 show all corrected Support Packages Patches
section:
➢ On release 4.2 you get the correction in the same version SP09 patch 900
On release 4.3 you require patches, too
© 2022
2022-07 SAP SE. All rights reserved. 99
Notes 3150454 3150463 - Information Disclosure vulnerability in
SAP NetWeaver Application Server ABAP and ABAP Platform
You have to enter the password of a technical user after changing target system related data:
Note 3150454 deals with type 3 and 3150463 with type W destinations.
© 2022
2022-07 SAP SE. All rights reserved. 100
Note 3153525 - Improvement of SecureStoreFS encryption
algorithms
The Secure Store in the File System of SAP NetWeaver AS Java is using a legacy algorithm for
encrypting data. This algorithm is deprecated and must be replaced with a stronger one.
Encrypted data of older systems, performing an SP update or upgrade to 7.50 SP 24 or higher, will not
be migrated automatically during the SUM process.
Follow these steps:
❑ Stop the Java cluster
❑ Create a database backup
❑ Open the Config Tool <AS_Java_install_dir>\configtool\configtool.bat
❑ Go to "secure store" section and choose "Change Key Phrase"
❑ Enter a keyphrase and choose the encryption algorithm. AES256 is the default algorithm.
If JCE unlimited cryptography is not installed, only AES128 algorithm will be available
❑ Click OK, then 'Apply changes' button and wait for the encryption process to finish
❑ Make sure the message "The migration of the key phrase of the Secure Store is performed
successfully." appeared, before you close the window.
❑ Start the Java cluster
© 2022
2022-07 SAP SE. All rights reserved. 101
Note 3153525 - Improvement of SecureStoreFS encryption
algorithms
How to confirm that the reencryption has been applied successfully:
a) You got files secstore.bak and Reencrypt.key - these files are your backup of the old
keyphrase
b) check the update time of file SecStore.key in folder
\usr\sap\<SID>\SYS\global\security\data
c) Check the version shown in this file:
7.50.000.005 - AES256
7.50.000.004 - AES128
7.00.000.001 - 3DES
See also:
KBA 1683616 - Configtool Key phrase change: AS Java doesn't start
KBA 1895736 - Check if secure store keyphrase is correct
KBA 2126229 - Recreating the SecStore.properties and SecStore.key for 7.3/7.4/7.5 J2EE NetWeaver
System
© 2022
2022-07 SAP SE. All rights reserved. 102
What's New for the User Administration and
Logging Check in S/4HANA On Premise
Frank Buchholz, Dieter Goedel, SAP
June 14, 2022
INTERNAL – SAP and Customers Only
What's New for the User Administration and Logging Check in
S/4HANA On Premise
a) Note 1856125 - FAQ | Tools for using the Audit Information System AIS
b) Note 139418 - Logging of user actions (ABAP server) Logging
c) Note 382318 - FAQ | Function module RFC_READ_TABLE RFC
d) Note 2680888 - SAL | Report for determination of differences in event parameters SAL
e) Note 2883981 - RSAU_READ* | anonymized display of Security Audit Log data SAL
f) Note 3090132 - RSUSR200 | Addition of logon information from job management User
g) Note 3113345 - SUIM | Reporting for User Documentation User
h) Note 3150573 - SUIM | Optimization of RSUSR_AUTH_DATA_VERSION User
i) Note 3147103 - SAIS | Check of customer-specific programs Code
j) Note 3204960 - SAIS_SEARCH_APPL | Search for programs without transaction TCODE
© 2022
2022-07 SAP SE. All rights reserved. 104
c) Note 382318 - FAQ | Function module RFC_READ_TABLE
© 2022
2022-07 SAP SE. All rights reserved. 105
c) Note 382318 - FAQ | Function module RFC_READ_TABLE
Authorization Concept
• Function RFC_READ_TABLE is the only member of function group SDTX. To avoid the unwished (local) start via the workbench toolset, no user
should be granted for S_DEVELOP with OBJTYPE = FUGR, OBJNAME = SDTX, ACTVT = 16.
• When the function is called via RFC, the authority check against object S_RFC with RFCTYPE = FUGR, RFC_NAME = SDTI, ACTVT = 16 or
RFCTYPE = FUNC, RFC_NAME = RFC_READ_TABLE, ACTVT = 16) will be processed.
• Inside the business logic of that function module, the authority check for generic table access will be checked against authorization
objects S_TABU_DIS or S_TABU_NAM (See note 1434284 for more details).
© 2022
2022-07 SAP SE. All rights reserved. 106
c) Note 382318 - FAQ | Function module RFC_READ_TABLE
Transaction SLDW_COMPARE
For access control lists
RFC_READ_TABLE_TABL
RFC_READ_TABLE_CALL
© 2022
2022-07 SAP SE. All rights reserved. 107
June 2022
Topics June 2022
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2022-06 SAP SE. All rights reserved. 109
Security Optimization Service for SAP Business Technology
Platform (BTP)
Blog: New Security Optimization Service Continuous Quality Check for SAP Business
Technology Platform (CQC SOS for BTP)
https://blogs.sap.com/2022/05/05/new-security-optimization-service-continuous-quality-check-for-business-technology-platform-cqc-sos-for-btp/
The SOS for the SAP Business Technology Platform provides a security assessment of those security-relevant
configurations and authorization assignments which are in the responsibility of the customer.
It covers all layers of the SAP Business Technology Platform (global account, directory, subaccount/organization
and space) and focuses on reviewing the platform aspects including but not limited to: application and service
authorizations, user and role management for platform and business users, trust configuration, API access and
audit log setup.
Note 696478 - SAP Security
Security Optimization Service - Sample Report for SAP BTP Optimization: Preparation
Note 3116601 - Long runtime of system recommendations job when there is invalid RFC connection
Workaround correction to limit the timeout to 3 seconds per failing connection
However, you should repair the configuration instead, see application log (Transaction SLG1 for AGS_SR):
© 2022
2022-06 SAP SE. All rights reserved. 111
System Recommendations
Recommended notes and KBAs
Note 3134903 - SysRec 7.2: Enhance system authorization check in Note Overview Page
Required if you have defined restrictions on user access to system via authorization object AI_LMDB_OB
Note 3191942 - SysRec: Updated flag of note is back after clicking the Refresh button
Improve processing of updated (republished) notes
Note 3196680 - The release of kernel component is missing in configuration validation report
Correction for missing release information of some kernel notes
© 2022
2022-06 SAP SE. All rights reserved. 112
System Recommendations
Troubleshooting
KBA 2449853 - SolMan 7.2: How to clear the SysRec buffer to refresh the calculation
Clear buffer manually if out of sync
KBA 3000603 - Note count in System Overview page is inconsistent to the Note count in Note Overview
Explanation that the statistics get updated by the System Recommendations job
© 2022
2022-06 SAP SE. All rights reserved. 113
Note 3158375 - Improper Access Control of SAProuter for SAP
NetWeaver and ABAP Platform
SAProuter configurations are vulnerable when a saprouttab entry of type P or S exists with
P/S <source-host> <dest-host> <dest-service> <password>
❑ a wildcard (*) for the destination host <dest-host>, and
❑ either a wildcard (*) or saprouter's own port number (3299 by default) for the destination
port <dest-service>.
You find SAProuter Security Notes like all other Security Notes on
https://support.sap.com/notes with Document type = SAP Security Notes
Let’s assume we can find the name SAPROUTER in the short text of basis notes – but as there
might be written as SAP ROUTER let’s search for “router” giving following result:
Note 3158375 - Improper Access Control of SAProuter 14.06.2022
Note 2622434 - Information disclosure relating to password in SAProuter 10.07.2018
Note 2037492 - Potential denial of service in SAP Router 14.10.2014
Note 1986895 - Potential disclosure of information in SAProuter 08.04.2014
Note 1853140 - Managing SAProuter from external host 12.11.2013
Note 1820666 - Potential remote code execution in SAProuter 08.05.2013
Note 1663732 - Potential information disclosure relating to SAProuter 03.08.2012
You get the same list if you search for application component BC-CST-NI
© 2022
2022-06 SAP SE. All rights reserved. 115
Note 3158375 - Improper Access Control of SAProuter for SAP
NetWeaver and ABAP Platform
© 2022
2022-06 SAP SE. All rights reserved. 116
Note 3104349 - Missing authorization check in S/4HANA finance for
advanced payment management
Component: FIN-FSCM-PF
Priority: low
The source code in a test class is not part of the production code of
the program and is not generated in production systems
(controlled using the profile parameter abap/test_generation).
See https://blogs.sap.com/2021/01/27/sap-gui-for-
windows-7.70-new-features-lifecycle-information/
© 2022
2022-06 SAP SE. All rights reserved. 118
What's New for the User Administration and
Logging Check in S/4HANA On Premise
Frank Buchholz, Dieter Goedel, SAP
June 14, 2022
INTERNAL – SAP and Customers Only
What's New for the User Administration and Logging Check in
S/4HANA On Premise
a) Note 1856125 - FAQ | Tools for using the Audit Information System AIS
b) Note 139418 - Logging of user actions (ABAP server) Logging
c) Note 382318 - FAQ | Function module RFC_READ_TABLE RFC
d) Note 2680888 - SAL | Report for determination of differences in event parameters SAL
e) Note 2883981 - RSAU_READ* | anonymized display of Security Audit Log data SAL
f) Note 3090132 - RSUSR200 | Addition of logon information from job management User
g) Note 3113345 - SUIM | Reporting for User Documentation User
h) Note 3150573 - SUIM | Optimization of RSUSR_AUTH_DATA_VERSION User
i) Note 3147103 - SAIS | Check of customer-specific programs Code
j) Note 3204960 - SAIS_SEARCH_APPL | Search for programs without transaction TCODE
© 2022
2022-06 SAP SE. All rights reserved. 120
a) Note 1856125 - FAQ | Tools for using the Audit Information System
Complete rework with Version 4 from 26.05.2021 listing various analysis reports.
(not all of these reports are already part of the audit structures SAP_AIS_BC_SA …)
© 2022
2022-06 SAP SE. All rights reserved. 121
a) Note 1881429 - FAQ | Usage of menu-based audit (SAIS)
Audit structures:
SAP_AIS_BC_SA AIS - System Audit
SAP_AIS_BC_SA_CCM_USR AIS - Users and Authorizations
SAP_AIS_BC_SA_CUS_TOL AIS - Repository/Tables
S4H_AUDIT_TAX S/4HANA Tax Audit
© 2022
2022-06 SAP SE. All rights reserved. 122
b) Note 139418 - Logging of user actions (ABAP server)
General change documents Generic logging of table content changes Performance statistics on user behavior
SAP Note 2423576 provides transaction SAIS_MONI, which supports a summarized, time-stream related
evaluation for selected recording types.
© 2022
2022-06 SAP SE. All rights reserved. 123
b) Note 2423576 - SAIS | Generic audit report about system changes
© 2022
2022-06 SAP SE. All rights reserved. 124
May 2022
Topics May 2022
Note 3165801 - Missing Authorization check in SAP NetWeaver Application Server ABAP
Note 3158188 - Information Disclosure vulnerability in SAP Host Agent logfile
Note 3145702 - Memory Corruption vulnerability in SAP Host Agent, SAP NetWeaver ABAP
Notes 2756188 and 2754555 - Cross-Site Request Forgery (CSRF) vulnerability in F0673
Approve Bank Payments
Note 2925755 - DBACOCKPIT missing authorizations / Critical authorizations S_DBCON and
S_TABU_SQL
Note 2370836 - File access management with transaction SFILE
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2022-05 SAP SE. All rights reserved. 126
Note 3165801 - Missing Authorization check in SAP NetWeaver
Application Server for ABAP and ABAP Platform
The similar ALV list functions do not execute such an early check:
The manual instruction asks for kernel note 2198580 from 2015
which you can ignore as it is most likely already implemented
(e.g. Kernel 7.22 patch 10 or higher).
This note is required because the code was protected by a special
comment:
© 2022
2022-05 SAP SE. All rights reserved. 127
Note 3158188 - Information Disclosure vulnerability in SAP Host Agent logfile
Note 3145702 - Memory Corruption vulnerability in SAP Host Agent, SAP NetWeaver ABAP
Note 3145702 is a Kernel note and solves a denial-of-service issue. You need to get
msg_server from scs.sar and sapstartsrv either from scs.sar, sapwebdisp.sar or
sapexe.sar.
Also an update to newest SAP Host Agent 722 Patch 56, from 06.05.2022, is necessary.
This solves the vulnerability described in note 3158188, too. This vulnerability is critical if the
SAP Host Agent debug trace level is set to 3.
Information on how to update SAP Host Agent can be found in note 1031096.
SAP HANA will get the updated version of the SAP Host Agent later, however, as it is an
independent component you can install it manually.
© 2022
2022-05 SAP SE. All rights reserved. 128
Notes 2756188 and 2754555 - Cross-Site Request Forgery (CSRF)
vulnerability in F0673 Approve Bank Payments
Both notes are related to the same issue but handle different software components which may
exist in the same or in different systems:
The correction was published in March 2019 and is most likely already implemented.
© 2022
2022-05 SAP SE. All rights reserved. 129
Note 2925755 - DBACOCKPIT missing authorizations / Critical
authorizations S_DBCON and S_TABU_SQL
https://help.sap.com/docs/SAP_NETWEAVER_DBOS/6b8fe8492ce14d24
af5855c3d10701e3/d4716e2d3f304b238463499cb3117b33.html
© 2022
2022-05 SAP SE. All rights reserved. 130
Note 2925755 - DBACOCKPIT missing authorizations / Critical
authorizations S_DBCON and S_TABU_SQL
Blog: The danger of the SQL Editor of DBACOCKPIT from Joe Goerlich
https://blogs.sap.com/2022/05/10/the-danger-of-the-sql-editor-of-dbacockpit/
“Since the SQL statements are executed on DB level as the connecting user, the privileges of this particular user
are applied. For the ABAP system’s primary database, it is the schema user SAPDAT, SAP<SID>, or SAPABAP<n>.
With this, the SQL Editor can be used, for example, to access all tables of the ABAP schema.
Please also note that on database level, there is no special handling of the client field (field ‘MANDT’). This
leads to data of any client can be accessed or modified, even if the SQL Editor is started, for example, in client
000.
The authorization object S_DBCON with activity 36 is very powerful and should not be granted
on a routine basis. It allows to harm the data’s integrity and availability.
Hint: SAP agreed to add a check for S_DBCON with activity 36 to the Security Check in SAP
EarlyWatch Alert.
The authorization object S_DBCON with activity 03 in combination with S_TABU_SQL is also
very powerful and should not be granted on a routine basis. It allows to harm the data’s
confidentiality.”
© 2022
2022-05 SAP SE. All rights reserved. 131
Directory Traversal
The often forgotten path
There are more than 1000 notes dealing with the topic of
Directory Traversal for NetWeaver ABAP-based solutions.
© 2022
2022-05 SAP SE. All rights reserved. 132
File Access in SAP Systems
Application Examples:
Server
Up/Download of HR or
ABAP FI documents from/to
application server
with variety of
Certain parts of the application programs, SA38,
server allow end users read and Kernel CG3Y, CG3Z, …
write access to files on operating
system level. This is required for Read/write
specific business processes. access
© 2022
2022-05 SAP SE. All rights reserved. 133
Note 2370836 - File access management with transaction SFILE
Vulnerability synopsis
Vulnerable
Application REACH report
Attacker
© 2022
2022-05 SAP SE. All rights reserved. 134
Note 2370836 - File access management with transaction SFILE
Solution concept
Frontend
SAP NetWeaver ABAP allows to restrict the
File Access of the system at following levels: (Browser, SAPGUI, RFC)
• Application – Logical File Name concept
• General – SPTH access control list
SAP NetWeaver Application Server ABAP
• User – authorization object S_DATASET
1 1 ABAP runtime environment
Application File Access check:
Check against Logical File Name
Application 2
configuration Underlying File Access check
Check Alias configuration routines:
Kernel
Check against SPTH entries
Check SPTH authorization group*
Check S_DATASET authorization
Available with
SAP_BASIS 751 SP01
respective
S/4HANA OP 1610 SP01
© 2022
2022-05 SAP SE. All rights reserved. 136
Note 2370836 - File access management with transaction SFILE
Configuration – Transaction SFILE
© 2022
2022-05 SAP SE. All rights reserved. 137
Note 2370836 - File access management with transaction SFILE
Configuration – Transaction SFILE
© 2022
2022-05 SAP SE. All rights reserved. 138
Note 2370836 - File access management with transaction SFILE
Configuration – Transaction SFILE
© 2022
2022-05 SAP SE. All rights reserved. 139
Note 2370836 - File access management with transaction SFILE
Required actions in a nutshell
© 2022
2022-05 SAP SE. All rights reserved. 140
Note 2370836 - File access management with transaction SFILE
Cheat Sheet
Logging-based solution to identify vulnerable logical file names (LFN) based Authorization for programs and file access
on usage ➢ Table SPTH and authorization object S_PATH, more details here.
➢ Activate Security Audit Log (SAL) via transaction RSAU_CONFIG ➢ To control general access rights to files from ABAP or user dependent
➢ Activate the events CUQ, CUR, CUS, CUT, DU5, and EU4 authorization checks.
Recommendation: To get the best results, run the system with activated SAL for 1. Call transaction SFILE and choose node ‘File Access & Authorization’.
several months (including month-end, quarter-end and possibly year-end 2. Choose option ‘Path ID for File Access Control’.
processes).
Maintain blocklist – Provide dedicated file paths with enabling option ‘No Read’
➢ Transfer logged SAL data to directory traversal specific data buffer
Maintain allowlist – Provide dedicated file paths with available options
1. Call transaction SFILE_MAINT_LOG
2. press the button ‘SAL-Buffer’, proceed with the given selection screen
➢ Authorization object S_DATASET, more details here.
Transaction SFILE is comparable to a cockpit allowing to manage all file
➢ To control access for particular files of particular programs
management operations.
➢ Additional information in note 2459510
1. Call transaction SFILE. Check note 2370836 for latest recommendations.
2. In section ‘Display Options’, choose ‘Administrator’ and execute.
3. Select node ‘Logical File Names (Cross client)’ and look for ‘Weighting’ Enforcement switch is provided to ensure that LFNs with missing configuration
column with following indicators: (physical path) cannot be accessed by any user in the system.
More details see note 2251231
RED – LFN is used, but logical and physical file paths are not configured
YELLOW – LFN is not yet used and logical and physical file paths are not 1. Call transaction SFILE and select node ‘General Setting’.
configured 2. Select subnode ‘General Setting for File Management’.
GREEN – LFN is used with both logical and physical file paths configured
3. Select parameter REJECT_EMPTY_PATH and option ‘ON’.
BLUE - LFN not yet used and configurations are securely maintained
ON - enforcement switch is on
4. Configure red and yellow LFNs with relevant logical and physical file paths to
improve the security. OFF - enforcement switch is off
© 2022
2022-05 SAP SE. All rights reserved. 141
Note 2370836 - File access management with transaction SFILE
Notes
and…
Note 27 - Recommendations for ABAP file interface
© 2022
2022-05 SAP SE. All rights reserved. 142
April 2022
Topics April 2022
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2022-04 SAP SE. All rights reserved. 144
Note 1753378 - Directory traversal in Web Container
I. Update your AS Java to a fixed version and SP. For more details see "SP Patch Level" section of this
note
→The solution was published in 2013. All Java systems should have the required software level.
II. Change value of the property DirectoryStructureProtection of the HTTP Provider service (http) to
"true" by following the steps:
For SAP Netweaver 7.10 and up
1. Open Configtool.
2. Choose "View" -> "Expert mode" should be checked.
3. Navigate to "Template" -> instance -> services -> http.
4. Choose "DirectoryStructureProtection" property.
5. In the Value field type true
6. Click Set Custom Value button
7. Press the Save button (diskette icon) in the top-left corner
8. Restart the server nodes for changes to take effect
→ This part is still relevant!
Tipps:
a) It is recommended to change on global/template level so that you can execute the change at once for all instances.
b) The recommended way to change offline properties is via Config tool as listed in the note and not directly in the offline configuration.
© 2022
2022-04 SAP SE. All rights reserved. 145
Note 1753378 - Directory traversal in Web Container
© 2022
2022-04 SAP SE. All rights reserved. 146
Note 2190119 - Background information about SAP S/4HANA
technical job repository
Required authorization for the background job user in all clients: Authorization profile SAP_ALL in S/4HANA 1610, role
or profile SAP_APP (= quite identical as SAP_ALL) as of S/4HANA 1709
Note 2731999 - Assign custom step user for Technical Job Repository (SJOBREPO)
Create role or profile SAP_APP (= quite identical as SAP_ALL) using report REGENERATE_SAP_APP and assign it
manually to the job user in all clients.
As you have to make sure that Basis and HR objects are included - otherwise no job can be executed and HR related job
definitions might fail – there is almost no difference between SAP_ALL and SAP_APP.
Transaction SJOBREPO_STEPUSER still generates a user of type B=System, no password and authorization profile
SAP_ALL.
→ It does not matter if you use SAP_ALL or SAP_APP (at least not for this scenario), both are critical
© 2022
2022-04 SAP SE. All rights reserved. 147
Note 2190119 - Background information about SAP S/4HANA
technical job repository
© 2022
2022-04 SAP SE. All rights reserved. 148
Spring Framework RCE in Java applications
Blogs:
https://www.cyberkendra.com/2022/03/springshell-rce-0-day-vulnerability.html
https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities/
https://www.rapid7.com/blog/post/2022/03/30/spring4shell-zero-day-vulnerability-in-spring-framework/
https://www.microsoft.com/security/blog/2022/04/04/springshell-rce-vulnerability-guidance-for-
protecting-against-and-detecting-cve-2022-22965/
[…]
© 2022
2022-04 SAP SE. All rights reserved. 149
Spring Framework RCE in Java applications
© 2022
2022-04 SAP SE. All rights reserved. 150
Spring Framework RCE in Java applications
How to fix?
• Update to Spring Framework versions 5.3.18 or 5.2.20 or higher
• Update to Spring Boot versions 2.6.6 or higher,
https://spring.io/blog/2022/03/31/spring-boot-2-6-6-available-now
• Workaround (not recommended): See section Suggested Workarounds of Early Announcement
© 2022
2022-04 SAP SE. All rights reserved. 151
Spring Framework RCE in Java applications
Notes:
Note 3170990 - Central Security Note for Remote Code Execution vulnerability associated with
Spring Framework
https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-center/sap-tc-01-5031.pdf
Note 3189428 - Remote Code Execution vulnerability associated with Spring Framework used
in SAP HANA Extended Application Services
• Description how to identify if there are vulnerable applications in addition to the XSA service itself
• Link to SAP EXTENDED APP SERVICES 1 patch 145
and
Note 3171255 - SAP BTP Cloud Foundry Environment - Detecting and remediating Spring 4 Shell
CVE-2022-22965 and CVE-2022-22963
© 2022
2022-04 SAP SE. All rights reserved. 152
Spring Framework RCE in Java applications
Notes:
Note 3187290 - Remote Code Execution vulnerability associated with Spring Framework used
in SAP Customer Checkout
Note 3189429 - Remote Code Execution vulnerability associated with Spring Framework used
in PowerDesigner Web (upto including 16.7 SP05 PL01)
[required if you have updated the default installation which is based on JRE 1.8]
Note 3189635 - Remote Code Execution vulnerability associated with Spring Framework used
in SAP Customer Profitability Analytics
[published on 14.04.2022]
Note 3171258 - Remote Code Execution vulnerability associated with Spring Framework used
in SAP Commerce
[published on 18.04.2022]
© 2022
2022-04 SAP SE. All rights reserved. 153
Spring Framework RCE in Java applications
Related topic:
CVE-2022-22963 - Remote code execution in Spring Cloud Function by malicious Spring Expression
https://tanzu.vmware.com/security/cve-2022-22963
© 2022
2022-04 SAP SE. All rights reserved. 154
My Trust Center / Security Whitepapers
My Security
https://support.sap.com/en/my-support/trust-center/tools-documentation.html
➢ SAP: Security Configuration Guide
➢ SAP S/4HANA: Encryption
➢…
Security Whitepapers
https://support.sap.com/securitywp
https://support.sap.com/en/security-whitepapers.html
➢ SAP HANA Security Whitepaper
➢ SAP Security Recommendations: Securing Remote Function Calls (RFC)
➢…
© 2022
2022-04 SAP SE. All rights reserved. 155
Note 3143705 - Silent migration of iterated random-salted password
hashes when configuration is hardened
Only passwords which are afterwards created or changed make use of the new setting.
With the kernel patches of this SAP Note (available as of kernel release 753), the kernel will
update a password hash also when just verifying a password, for example during password-
based user logon.
The metric for the security of a password hash uses the following hierarchy:
1. Hash algorithm (iSSHA-512 > iSSHA-384 > iSSHA-256 > iSSHA-1). When the algorithm is equal:
2. Number of iterations (e.g. 15000 > 10000). When the number of iterations is equal:
3. Saltsize (e.g. 128 > 96).
© 2022
2022-04 SAP SE. All rights reserved. 156
Note 3192199 - Enabling SNC in Jco communications from
Diagnostics Agent
The SAP NetWeaver ABAP system is already SNC enabled.
You want to enforce that all connections of an SAP NetWeaver ABAP system are encrypted. Therefore, you want
to set profile parameter snc/only_encrypted_rfc to 1.
The connection between the SAP Solution Manager Diagnostics Agent and the locally monitored SAP NetWeaver
ABAP system use JCo/RFC, too. It requires special configuration to encrypt this communication channel.
This setup requires a good understanding of the SNC mechanism and its implementation for JCo/RFC
connections as well as a general understanding of certificates and their management in SAP systems. Since this
is an advanced configuration, an initial implementation with some consulting support is usually recommended.
© 2022
2022-04 SAP SE. All rights reserved. 157
Note 3192199 - Enabling SNC in Jco communications from
Diagnostics Agent
2
Sample screens
© 2022
2022-04 SAP SE. All rights reserved. 158
Note 3170439 - SM19 | Detail selection for EU* and FU* events
FU1 RFC function &B with dynamic destination &C was called in program &A
Dynamic destinations are generated by an ABAP program at runtime and do not have to be defined in transaction
SM59. Depending on the configuration of the dynamic connection, it is also possible to switch users or log on
without a password using trusted RFC.
For more information, see note 2156564.
FU2 Parsing of an XML data stream canceled for security reasons (reason = &A
The ABAP XML parser canceled the parsing of an XML data stream for security reasons. It is possible that the
data stream in question contains harmful DTD.
© 2022
2022-04 SAP SE. All rights reserved. 159
March 2022
Topics March 2022
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2022-03 SAP SE. All rights reserved. 161
SAP Support Portal connection
Renew client certificate of technical S-user
Client certificates have a limited lifetime of 1 year. Therefore you have to renew the certificates at least
once per year – either manually or automatically.
KBA 2805811 - How to enable client certificate authentication for technical communication users
Method 1: Get SAP Passport from SAP Support Portal.
This PSE is protected by a password, automatic renewal is not possible due to limitations.
Method 2: Generate PSE in transaction STRUST and process a Certificate Signing Request (CSR)
You can use automatic creation as well as automatic renewal.
KBA 2911301 - SAP Support Portal connection - Renew client certificate of technical S-user
Note 2946444 - SAP Support Portal connection - Renew client certificate of technical S-user according to
KBA 2911301
The new version of report RSUPPORT_HUB_CERT_RENEWAL verifies if the PSE is accessible for automatic
renewal.
© 2022
2020-08 SAP SE. All rights reserved. 163
Generic recommendations to secure support access
Maintain Connections
https://launchpad.support.sap.com/#/remoteconnectivity
View Logbook
https://launchpad.support.sap.com/#/remoteconnectivitylogbook
Get an overview about open connections and recently used remote connections for selected systems
in a chosen time period, including details like service type, actions taken, reasons, etc.
System Data
https://launchpad.support.sap.com/#/systemdata
Edit “System Data” to flag systems as EU data protection-relevant to restrict remote access and data storage to SAP
support employees from countries that have implemented the EU Data Protection Directive.
© 2022
2022-03 SAP SE. All rights reserved. 165
Note 3145987 - Missing Authentication check in SAP Focused Run
(Simple Diagnostics Agent 1.0)
Solution
2. Upgrade the SAP Host Agent to 7.22 PL55 or later. See note 3113553
The note not only solves CVE-2021-42550 as described in referred notes. (This vulnerability is
considered to pose a lesser threat than log4shell because it requires access to logback's configuration
file by the attacker, which requires to sign on to an already compromised system. See
https://logback.qos.ch/news.html )
The note solves CVE-2022-24396, which has CVSS score 9.3, priority HotNews.
The solution covers Note 3147102, too.
© 2022
2022-03 SAP SE. All rights reserved. 166
Note 3149805 - Cross-Site Scripting (XSS) vulnerability in SAP Fiori
launchpad
> Will the issue be fixed once SAP Security Note 3149805 is implemented or do we need to
upgrade to the latest SP?
Yes, once the note is implemented the issue will be fixed. No full SP upgrade is required for the
releases mentioned in the note.
© 2022
2022-03 SAP SE. All rights reserved. 167
Note 3111110 - Denial of service (DOS) in SAPCAR
There might exist many of copies of program sapcar somewhere on client machines and on
servers.
→ Inform administrator to select the correct OS system and get the current version of sapcar
from SAP Software Downloads:
Mitigation: Old version of sapcar produce correct archive files. A potential attacker need to
construct a sar file without using sapcar.
© 2022
2022-03 SAP SE. All rights reserved. 168
Note 863362 - Security checks in SAP EarlyWatch Alert, EarlyWatch,
and GoingLive sessions
© 2022
2022-03 SAP SE. All rights reserved. 169
Note 863362 - Security checks in SAP EarlyWatch Alert, EarlyWatch,
and GoingLive sessions
Critical authorizations, which should only see very limited use in production
(Only shown if there is no ‘red’ alert)
❑ Users with critical authorizations, which should only see very limited use in production in client 000 [yellow]
❑ Users with critical authorizations, which should only see very limited use in production in other client(s) than 000 [yellow]
© 2022
2022-03 SAP SE. All rights reserved. 170
Note 863362 - Security checks in SAP EarlyWatch Alert, EarlyWatch,
and GoingLive sessions
Critical authorizations, which should not be used in production Critical if a large number of users in a client have the
❑ Users authorized to change or display all tables S_TABU_DIS 02/03 * authorization:
• More than 75 users of a client have the authorization
• More than 10% of the users (but at least 11) of a
client have the authorization
Critical authorizations, which should only see very limited use in production
❑ Users authorized to start all reports S_PROGRAM SUBMIT * Same valuation rules as previous group
The highest possible rating of these authorization checks
❑ Users authorized to administer RFC connections S_RFC_TT 02 *
is "yellow".
❑ Users authorized to reset/change user passwords S_USER_GRP 05 *
© 2022
2022-03 SAP SE. All rights reserved. 171
February 2022
Topics February 2022
Note 3140940 - Missing segregation of duties in SAP Solution Manager Diagnostics Root Cause
Analysis Tools
Note 3123396 - Request smuggling and request concatenation in SAP NetWeaver, SAP Content
Server and SAP Web Dispatcher
Note 3123427 - HTTP Request Smuggling in SAP NetWeaver Application Server Java
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2022-02 SAP SE. All rights reserved. 173
Note 3140940 - Missing segregation of duties in SAP Solution
Manager Diagnostics Root Cause Analysis Tools
The security note
removes the
following Root
Cause Analysis
tools from the SAP
Solution Manager
© 2022
2022-02 SAP SE. All rights reserved. 174
Note 3140940 - Missing segregation of duties in SAP Solution
Manager Diagnostics Root Cause Analysis Tools
Insides: Complete Removal from ABAP
and Java for SolMan 7.20 SP 3 or higher
ABAP:
Implement Note 3137764 - RCA Tools Removal
Java:
Implement this Note 3145008 - Removal of RCA Tools
© 2022
2022-02 SAP SE. All rights reserved. 175
Note 3140940 - Missing segregation of duties in SAP Solution
Manager Diagnostics Root Cause Analysis Tools
OS Command Console Execute commands via the operating system's remote access.
tc~webadministrator~oscommand
File System Browser Use the local operating system specific features to get access to the
tc~webadministrator~fsbrowser file system of the managed system.
Log Viewer Use the operating system's remote access features to retrieve the log
tc~webadministrator~standlogviewer files from the managed system and analyze them on your local
machine.
Thread Dump Analysis Use the operating system's remote access features to execute the
tc~webadministrator~tda thread dump creation command.
Retrieve the thread dump file from the managed system and analyze
them on your local machine.
See also
Note 2671374 - How to generate Thread dumps using SAP JVM Eclipse plug-in
Note 1020246 - Thread Dump Viewer for SAP Java Engine
© 2022
2022-02 SAP SE. All rights reserved. 176
Note 3123396 - Request smuggling and request concatenation in
SAP NetWeaver, SAP Content Server and SAP Web Dispatcher
ABAP and Java Systems are affected
© 2022
2022-02 SAP SE. All rights reserved. 177
Note 3123396 - Request smuggling and request concatenation in
SAP NetWeaver, SAP Content Server and SAP Web Dispatcher
a) Consider the Workaround (if you cannot update ABAP and Java systems in short time)
1. Update Web Dispatcher installations according to note 3138881 and set the parameter
wdisp/additional_conn_close=TRUE
respective
2. Define rewrite rules for the ICM according to note 3137885
b) Update ABAP (dw.sar) and Java Systems which use a Web Dispatcher, Load Balancer or
3rd party proxy according note 3123396
© 2022
2022-02 SAP SE. All rights reserved. 178
Note 3123396 - Request smuggling and request concatenation in
SAP NetWeaver, SAP Content Server and SAP Web Dispatcher
The solution also covers the vulnerability described in related note 3123427 - HTTP Request
Smuggling in SAP NetWeaver Application Server Java
Caution:
see https://wiki.scn.sap.com/wiki/display/SI/SAP+Kernel%3A+Important+News):
The following SAP Web Dispatcher releases are affected starting with the patch levels:
753#920, 777#433, 781#231, 785#073.
For details and correction see Note 3147927 ”wdisp/additional_conn_close causes errors for
SAP NetWeaver AS Java servers”.
© 2022
2022-02 SAP SE. All rights reserved. 179
Note 3123396 - Request smuggling and request concatenation in
SAP NetWeaver, SAP Content Server and SAP Web Dispatcher
Application System Recommendation might fail to show Kernel related notes if the LMDB is not
up to date.
Use application Change Reporting respective transaction CCDB in the SAP Solution Manager to
inspect the Configuration Stores SAP_KERNEL und CRYPTOLIB.
Caution: All these tools know about the version defined in the main manifest file which gets
updated as part of a stack Kernel update. If you just update dw.sar like in this case, then these
tools do not get new information and continue showing the note.
© 2022
2022-02 SAP SE. All rights reserved. 180
Note 3123396 - Request smuggling and request concatenation in
SAP NetWeaver, SAP Content Server and SAP Web Dispatcher
Check Java Kernel release using
SAP Solution Manager CCDB
Configuration Store:
SAP_J2EEClusterNode
Configuration Item:
SAPJStartVersion
© 2022
2022-02 SAP SE. All rights reserved. 181
Note 3123396 - Request smuggling and request concatenation in
SAP NetWeaver, SAP Content Server and SAP Web Dispatcher
Check ABAP Kernel release using FRUN Configuration & Security Analysis
© 2022
2022-02 SAP SE. All rights reserved. 182
Note 3123396 - Request smuggling and request concatenation in
SAP NetWeaver, SAP Content Server and SAP Web Dispatcher
Check Java Kernel release using FRUN Configuration & Security Analysis
© 2022
2022-02 SAP SE. All rights reserved. 183
January 2022
Topics January 2022
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2022-01 SAP SE. All rights reserved. 185
Note 3131047 Critical vulnerabilities in log4j v2
CVE-2021-44228, CVE-2021-45046, CVE-2021-44832, CVE-2021-45105
Count
CVSS SAP of SAP
CVE Vulnerability Correction Score CVSS Vector Priority notes
Remote Code
CVE-2021-44228 Log4j 2.15.0 (Java 8) 10.0 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H very high 133
Execution
6. Choose Status
„Irrelevant“
6
© 2022
2022-01 SAP SE. All rights reserved. 188
Note 3112928 - Multiple vulnerabilities in F0743 Create Single
Payment application of SAP S/4HANA
The solution enables to use a virus scanner on the server (not the client) to validate uploaded
attachments. The application uses the default profile (according to transaction VSCANPROFILE).
© 2022
2022-01 SAP SE. All rights reserved. 189
Note 3117350 - SCM Optimizer run terminates with
"CALLBACK_REJECTED_BY_WHITELIST"
After the corrections, an administrator requires authorizations for S_RZL_ADM to execute the
WebDynpro applications of Generic Request and Message Generation:
You can skip the manual activity if the text (in German) is already part of the automatic
correction instruction:
© 2022
2022-01 SAP SE. All rights reserved. 191
December 2021
Topics December 2021
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2021-12 SAP SE. All rights reserved. 193
Critical vulnerability in log4j CVE-2021-44228 (plus CVE-2021-45046)
CVE-2021-44228: Apache Log4j2 <= 2.14.1 JNDI (Java Naming and Directory Interface) features
used in configuration, log messages, and parameters do not protect against attacker controlled
LDAP and other JNDI related endpoints. An attacker who can control log messages or log
message parameters can execute arbitrary code loaded from LDAP servers when message
lookup substitution is enabled.
From log4j 2.15.0, this behavior has been disabled by default. A less important issue is solved in 2.16.0
In previous releases (>= 2.10 ) this behavior can be mitigated by setting system property
checked on GitHub
"log4j2.formatMsgNoLookups" to “true”
or it can be mitigated in prior releases (< 2.10) by removing the JndiLookup class from the
classpath (example: zip -q -d log4j-core-*.jar
org/apache/logging/log4j/core/lookup/JndiLookup.class).
Older releases 1.x are not affected by this specific vulnerability checked on GitHub
(but could be on risk depending on the configuration of the application which uses it and may suffer from another vulnerability)
© 2022
2021-12 SAP SE. All rights reserved. 194
Critical vulnerability in log4j CVE-2021-44228
© 2022
2021-12 SAP SE. All rights reserved. 196
Critical vulnerability in log4j CVE-2021-44228
© 2022
2021-12 SAP SE. All rights reserved. 197
Critical vulnerability in log4j CVE-2021-44228
© 2022
2021-12 SAP SE. All rights reserved. 198
Critical vulnerability in log4j CVE-2021-44228
Official statement, list of affected and not affected products and links to configuration notes:
https://support.sap.com/content/dam/support/en_us/library/ssp/my-support/trust-center/sap-tc-01-5025.pdf
No Known Impact At the time of publication (time stamped above), the following non-exhaustive list of SAP products
do not contain components affected by this CVE.
Current Patch Application At the time of publication, the following products have been identified as using Log4J.
Appropriate patching, or recommended temporary fixes, were applied.
Patch Pending At the time of publication, the following products are pending patch development.
The available workarounds are found in the links provided below.
Please know that the products listed across these three categories is not an exhaustive list of all SAP
products.
Customers are encouraged to contact SAP’s support portal for more information if they have a question
about a non-listed product.
© 2022
2021-12 SAP SE. All rights reserved. 199
Critical vulnerability in log4j CVE-2021-44228
You find the component specific notes describing the workaround or the solution (as soon as it’s available) here:
Note 3131047 - Central Security Note for Remote Code Execution vulnerability associated with Apache Log4j 2
component
Therefore, search for „Log4J” and add an restriction by date >= 10.12.2021
https://launchpad.support.sap.com/#/solutions/notes/?sortBy=date&sortOrder=desc&q=Log4J
Limitation:
EWA, SOS, System Recommendations, CCDB or Configuration Validation do not show affected systems.
© 2022
2021-12 SAP SE. All rights reserved. 200
Note 3119365 - Code Injection vulnerability in SAP ABAP Server &
ABAP Platform (SAP internal translation tools)
RS_LXE_EXTRACT_LXELOG2CSV
RS_LXE_EXTRACT_OL2CSV
RS_LXE_EXTRACT_WORK_LIST2CSV
In any case, you can verify if these reports either do not exist or have commented coding.
© 2022
2021-12 SAP SE. All rights reserved. 208
Note 3102769 - Cross-Site Scripting (XSS) vulnerability in SAP
Knowledge Warehouse
This component displays only these documents, which were created and/or modified using
SAP Knowledge Warehouse.
No other applications use the component.
Workaround to switch off the application (if you are not using it):
Option 1: Disable the vulnerable application following the documentation in Config Tool Adding Filters.
Parameters 'Component Name Mask’ = tc~km_tc*, 'Vendor Mask’ = sap.com
Option 2: In case the requests are routed via SAP Web Dispatcher you may add a rewrite rule to SAP
Web Dispatcher to prevent from redirects.
© 2022
2021-12 SAP SE. All rights reserved. 209
SAP Secure By Default for S/4HANA on-premise
Introduction
© 2022
2021-12 SAP SE. All rights reserved. 210
SAP Secure By Default for S/4HANA on-premise
Status
Products in scope
• SAP S/4HANA on Premise 2021 (settings were partially shipped since SAP S/4HANA 1909)
• SAP BW/4HANA 2021
• Products based on S/4HANA Foundation 2021, e.g.
− SAP Focused Run 3.0
− SAP Access Control
− SAP Customer Activity Repository
Customer documentation
• SAP Notes 2926224 is a collection note including attachment
• SAP Blog https://blogs.sap.com/2021/10/20/the-story-resumes-secure-by-default-for-sap-s-4hana-2021/
Status
• First shipment done with SAP S/4HANA on premise 1909
• Additional security topics shipped with SAP S/4HANA on premise 2020 and 2021
• Further improvements planned with SAP S/4HANA on premise 2022
© 2022
2021-12 SAP SE. All rights reserved. 211
SAP Secure By Default for S/4HANA on-premise
How can customers get the improvements?
INSTALLATION
SYSTEM COPY
© 2022
2021-12 SAP SE. All rights reserved. 212
SAP Secure By Default for S/4HANA on-premise
How can customers get the improvements?
SAP ERP 6.0
Secure by default in SAP S/4HANA EhP 8
(Note 2926224) is shipped and enabled for:
ENHANCEMENT PACKAGE
SYSTEM COPY
© 2022
2021-12 SAP SE. All rights reserved. 213
SAP Secure By Default for S/4HANA on-premise
How can customers get the improvements?
SAP ERP 6.0
Secure by default in SAP S/4HANA EhP 8
(Note 2926224) is shipped and enabled for:
ENHANCEMENT PACKAGE
© 2022
2021-12 SAP SE. All rights reserved. 214
SAP Secure By Default for S/4HANA on-premise 1909 / 2020
Technical view
Profile parameters are set to secure values for SAP S/4HANA 1909 / 2020
• 17 recommended values
• 27 parameters default values were changed in the SAP S/4HANA 2020 (SAP Kernel 7.81)
© 2022
2021-12 SAP SE. All rights reserved. 215
SAP Secure By Default for S/4HANA on-premise 2021
Technical view
Table logging
Activation of ABAP table logging for business-critical tables
Security configurations
• Activation of “start authorization checks” for Web Dynpro
• Enablement of the UCON HTTP Allowlist framework for increased protection of HTTP traffic
• Activation of all defined SLDW scenarios
© 2022
2021-12 SAP SE. All rights reserved. 216
SAP Secure By Default for S/4HANA on-premise 2021
Central Documentation
© 2022
2021-12 SAP SE. All rights reserved. 217
SAP Secure By Default for S/4HANA on-premise
© 2022
2021-12 SAP SE. All rights reserved. 218
SAP Secure By Default for S/4HANA on-premise
Technical view – recommended values for profile parameters
© 2022
2021-12 SAP SE. All rights reserved. 219
SAP Secure By Default for S/4HANA on-premise
Recommended Profile Parameters
rfc/callback_security_method = 3
Denies callbacks via RFC which are executed with the authorization of the calling user
system/secure_communication = ON
Enables the TLS encryption and mTLS authentication for the internal communication of the ABAP
application server
But also all the others have been set to a secure value for good reasons
Compare the current values with the recommended values using report RSPFRECOMMENDED
© 2022
2021-12 SAP SE. All rights reserved. 220
SAP Secure By Default for S/4HANA on-premise
Recommended Profile Parameters - ICM Logging
© 2022
2021-12 SAP SE. All rights reserved. 221
SAP Secure By Default for S/4HANA on-premise
SAP Security Audit Log – SecureByDefault Filter Configuration
Full log of SAP* Full log of client 066 Almost full log of all users in all clients
(except 6 high volume events)
Following events are not
logged
▪ AU5
RFC/CPIC logon successful (type=&A,
method=&C)
▪ AUK
Successful RFC call &C (function group = &A)
▪ AUW
Report &A started
▪ CUV
Successful WS Call (service = &A, operation &B)
▪ DUR
JSON RPC call of function module &A succeeded
▪ EUE
RFC function module &A called successfully
© 2022
2021-12 SAP SE. All rights reserved. 223
SAP Secure By Default for S/4HANA on-premise
© 2022
2021-12 SAP SE. All rights reserved. 224
SAP Secure By Default for S/4HANA on-premise 2021
HANA Audit Policies for S/4HANA
© 2022
2021-12 SAP SE. All rights reserved. 225
SAP Secure By Default for S/4HANA on-premise 2021
Table Logging (rec/client = ALL)
© 2022
2021-12 SAP SE. All rights reserved. 226
SAP Secure By Default for S/4HANA on-premise 2021
Enablement of the UCON HTTP Allowlist framework
UCON HTTP Allowlist framework can be enabled for increased protection of HTTP traffic
Context Type 01 - Trusted Network Zone
– Active Check
– 1 entry is automatically added to the allowlist to allow all relative path names
Context Type 02 - Clickjacking Framing Protection
– Active Check
– No entries are added to the allowlist
Context Type 03 - CSS Style Sheet
– Active Check
– 1 entry is automatically added to the allowlist
to allow all relative path names.
Context Type 04 - Cross-origin Resource
Sharing
– Not enabled
– CORS should only be enabled and configured
in case necessary as CORS relaxes the same
origin policy of browsers
© 2022
2021-12 SAP SE. All rights reserved. 227
SAP Secure By Default for S/4HANA on-premise 2021
Some changes to authorizations
© 2022
2021-12 SAP SE. All rights reserved. 228
SAP Secure By Default for S/4HANA on-premise 2021
Transport Management Parameters
Security relevant Transport Management Parameters have been changed to secure defaults
(controlled via table TPSYSTEMDEFAULTS)
VERS_AT_IMP = ALWAYS
This parameter enables creation of new versions during transport imports. If VERS_AT_IMP is not set,
versioning in the version database is deactivated upon import (repository object, e.g. report lacks version
history in the production system).
TLOGOCHECK = TRUE
Controls whether certain consistency checks for transport object definitions are done. This check prevents
the import of table entries that do not belong to the object definition in the target system.
RECCLIENT = ALL
Controls whether write operations on certain tables (flagged appropriately in their technical settings in ABAP
Dictionary) are logged if changes are imported using transports. If not set to ALL, table auditing is disabled
for all clients for transports.
© 2022
2021-12 SAP SE. All rights reserved. 229
SAP Secure By Default for S/4HANA on-premise
© 2022
2021-12 SAP SE. All rights reserved. 230
SAP Secure By Default for S/4HANA on-premise
Upgrade Scenarios
© 2022
2021-12 SAP SE. All rights reserved. 232
SAP Secure By Default for S/4HANA on-premise
Is this enough security?
© 2022
2021-12 SAP SE. All rights reserved. 233
November 2021
Topics November 2021
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2021-11 SAP SE. All rights reserved. 235
Security Guide for SAP S/4HANA (new version)
© 2022
2021-11 SAP SE. All rights reserved. 236
SAP Secure By Default for S/4HANA on Premise 2021
Status - October 2021
Bjoern Brencher, S/4HANA Security
Note 2926224 New security settings for SAP S/4HANA and SAP
BW/4HANA using SL Toolset and SUM
New installations (with SWPM), system copies (with SWPM) and system conversions from SAP
ERP to SAP S/4HANA (with SUM) will automatically receive the recommended security settings.
Though it’s recommended to also apply the updated security settings in system which have
been upgraded from older SAP S/4HANA and BW/4HANA releases.
© 2022
2021-11 SAP SE. All rights reserved. 238
Note 2926224 New security settings for SAP S/4HANA and SAP
BW/4HANA using SL Toolset and SUM
New settings in S/4HANA 2021:
✓ Profile parameter rec/client = ALL and transport parameter RECCLIENT = ALL Note 3093760
✓ UCON HTTP allowlist for all relative path for 01 Trusted Network Zone and 03 CSS Style Sheet
Active Check 02 Clickjacking Framing Protection Note 3083852
✓ Enable authorization object S_START checks for Web Dynpro Application Configuration (WDCA)
and Web Dynpro Applications (WDYA) Note 1413011 Note 3064888
✓ All SLDW scenarios are set to productive scenario as shipped by SAP. In certain cases, additional
activation of allowlist checks might be necessary (status of check is not active) Note 1922712
✓ HANA auditing is enabled in TenantDB and a recommended set of HANA audit policies
is configured in TenantDB Note 3016478
© 2022
2021-11 SAP SE. All rights reserved. 239
Note 2926224 New security settings for SAP S/4HANA and SAP
BW/4HANA using SL Toolset and SUM
Secure by default settings about logging require well defined data retention processes.
© 2022
2021-11 SAP SE. All rights reserved. 240
Note 3064888 - Start authorization check for Web Dynpro applications and
Web Dynpro application configurations in SAP S/4HANA
The authorization check for S_START for
WebDynpro Apps is deactive by default.
If you want to use is (similar like using
S_TCODE for transactions), you have to
activate it.
In higher releases, call transaction SU25.
Under "Adjust the Authorization Checks
(Optional)", start "Activate Web Dynpro Start
Authorization Check (S_START)"
Secure by
Default
© 2022
2021-11 SAP SE. All rights reserved. 241
Note 1413011 - New start authorization check for Web Dynpro ABAP
The authorization check for S_START for WebDynpro Apps is deactive by default.
If you want to use is (similar like using S_TCODE for transactions), you have to activate it.
In lower releases use SM30 for client independent customizing table USOBAUTHINACTIVE
PGMID OBJID Default Status Description / Topic
R3TR G4BA active (unknown)
R3TR HTTP active (unknown)
Inbound Processing of Idocs
R3TR IDOC inactive Used in report RBDAPP01 (and related)
(only for tracing)
R3TR OSOD inactive (unknown)
R3TR PDWS inactive Workflow, (only for tracing)
Application Job Starter
R3TR SAJC inactive
Used in report RSBTCPT6 (and related)
R3TR SAPC inactive ABAP Channels - APC Security Features
Not Secure WDCA
R3TR inactive Starting Web Dynpro ABAP Applications
by Default WDYA
R3TR SADT (no entry = active) Used in ADT REST Framework
© 2022
2021-11 SAP SE. All rights reserved. 242
Note 1413011 - New start authorization check for Web Dynpro ABAP
Good news:
Transaction PFCG adds authorizations for S_START automatically if you add WebDynpro Apps
to the role menu
➢ Independent from setting of the main switch
➢ Independent from settings in SU24
(if fact you should not add proposals for S_START in SU24)
© 2022
2021-11 SAP SE. All rights reserved. 243
Show active roles containing WebDynpro ABAP applications
Report RSUSR_START_APPL
Search for WebDynpro applications in assigned roles
© 2022
2021-11 SAP SE. All rights reserved. 244
Show active roles containing WebDynpro ABAP applications
Report RSUSR_START_APPL
The list shows roles and the status of the selected applications
1) If the app is part of the role menu
2) If the app is contained in role authorizations
3) If the authorization profile is active
4) If the app is contained in current authorization profile
1 2 3 4
© 2022
2021-11 SAP SE. All rights reserved. 245
How to trace usage of WebDynpro applications
© 2022
2017-01 SAP SE. All rights reserved. 246
Authorization trace for WebDynpro ABAP start authorization
Profile parameter auth/auth_user_trace
Prerequisite:
© 2022
2021-11 SAP SE. All rights reserved. 247
Authorization trace for WebDynpro ABAP start authorization
Transaction STUSERTRACE
Activate the trace using transaction STUSERTRACE with filter for application type
“TADIR Service” and for authorization object S_START
© 2022
2021-11 SAP SE. All rights reserved. 248
Authorization trace for WebDynpro ABAP start authorization
Transaction STUSERTRACE
For reporting you can filter for “Web Dynpro Application” and authorization object S_START
© 2022
2021-11 SAP SE. All rights reserved. 249
Security Baseline Template 2.3
The corresponding package 2.3_CV-1 for application Configuration Validation will be published
soon (for ABAP, Java, Hana but no content for BTP).
© 2022
2021-11 SAP SE. All rights reserved. 250
Note 3099776 - Missing Authorization check in ABAP Kernel
„Under certain conditions, Trusted Trusting allows an attacker to elevate their privileges within RFC or HTTP
communication and execute application specific logic in another system.”
“If an application in trusted-trusting connections uses TCODE for authorization, this check is implemented by
the correction.”
© 2022
2021-11 SAP SE. All rights reserved. 253
Note 3099776 - Missing Authorization check in ABAP Kernel
In the target systems use transaction SE16 to validate the relevant settings.
Current system
If set, calling system
Systems whose calls are trusted sends transaction code
© 2022
2021-11 SAP SE. All rights reserved. 255
Note 3099776 - Missing Authorization check in ABAP Kernel
In the CCDB and application Configuration Validation you can use same field RFCTCDCHK of
Configuration Store RFCSYSACL to validate if the transaction flag is active for Trusted RFC
definitions.
© 2022
2021-11 SAP SE. All rights reserved. 256
Note 3105728 - Leverage of Permission in SAP NetWeaver
Application Server for ABAP
Issue: The display role
SAP_BC_DWB_WBDISPLAY
contains change authorizations,
too.
Security @ Devtoberfest
Security @ Teched 2021
Note 3078609 - Missing Authorization check in SAP NetWeaver Application Server for Java
(JMS Connector Service)
Note 3097887 - Improper Authorization in SAP NetWeaver AS ABAP and ABAP Platform
Notes 2988956 and 2988962 - Cross-Site Request Forgery (CSRF) vulnerability in S/4HANA
OP2020, OP1909 in Import Financial Plan Data
Note 3077635 - Denial of service (DOS) in the SAP SuccessFactors Mobile Application for
Android devices
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2021-10 SAP SE. All rights reserved. 260
Security @ Devtoberfest
Devtoberfest
https://developers.sap.com/devtoberfest.html
Central frameworks like J2EE-FRMW / J2EE ENGINE FRAMEWORK usually have strong
prerequisites concerning other software components
→ Use Software Update Manager (SUM) to run a full update but do not try to update just this
component.
© 2022
2021-10 SAP SE. All rights reserved. 263
Note 3078609 - Missing Authorization check in SAP NetWeaver
Application Server for Java (JMS Connector Service)
Developer Guide
➢ JMS Overview
https://help.sap.com/viewer/c591e2679e104fcdb8dc8e77771ff524/7.5.22/en-US/4b1d0fe7218d74fee10000000a421937.html
The Java Message Service (JMS) is an enterprise messaging system that provides a way for
business applications to exchange data without needing to be directly connected to each other.
© 2022
2021-10 SAP SE. All rights reserved. 264
Note 3078609 - Missing Authorization check in SAP NetWeaver
Application Server for Java (JMS Connector Service)
Application Server Java P4 over SSL None 50006 50006-59906 5<NN>06 Yes No
Take care about other
critical ports like P4 Application Server Java IIOP None 50007 50007-59907 5<NN>07 Yes No
or Telnet, too!
Application Server Java Telnet None 50008 50008-59908 5<NN>08 Yes No
Application Server Java HTTP sapctrl<NN> 50013 50013-59913 5<NN>13 Yes Yes
Application Server Java HTTPS sapctrls<NN> 50014 50014-59914 5<NN>14 Yes Yes
© 2022
2021-10 SAP SE. All rights reserved. 265
Note 3097887 - Improper Authorization in SAP NetWeaver AS ABAP
and ABAP Platform
This quite old report allows to modify transport attributes even after releasing it:
Mitigation: an authorization for S_CTS_ADMI with value CTS_ADMFCT = TABL is required to execute
this report.
© 2022
2021-10 SAP SE. All rights reserved. 266
Note 3097887 - Improper Authorization in SAP NetWeaver AS ABAP
and ABAP Platform
© 2022
2021-10 SAP SE. All rights reserved. 267
Notes 2988956 and 2988962 - Cross-Site Request Forgery (CSRF)
vulnerability in Import Financial Plan Data
You see 2 notes referring to the same issue because 2 different software components are
affected:
Note 2988956
➢ Software Component UIAPFI70
➢ Support Packages SAPK-70004INUIAPFI70 or SAPK-80001INUIAPFI70
respective automatic correction instruction for transaction SNOTE
Note 2988962
➢ Software Component S4CORE
➢ Support Packages SAPK-10404INS4CORE or SAPK-10501INS4CORE
respective manual correction instruction as described in the note
If you only apply one of them you get an error in the application!
© 2022
2021-10 SAP SE. All rights reserved. 268
Note 2988962 - Cross-Site Request Forgery (CSRF) vulnerability for
S/4HANA OP2020, OP1909 in Import Financial Plan Data
Manual correction:
Transaction SEGW
Find project
FINS_ACDOC_PLAN_IMPORT
© 2022
2021-10 SAP SE. All rights reserved. 269
Note 2988962 - Cross-Site Request Forgery (CSRF) vulnerability for
S/4HANA OP2020, OP1909 in Import Financial Plan Data
© 2022
2021-10 SAP SE. All rights reserved. 270
Note 3077635 - Denial of service (DOS) in the SAP SuccessFactors
Mobile Application for Android devices
The issue is solved in version 6.32.1 (= version 2108 as described in the note)
Take care to update your corporate app store for corporate devices.
SAP SuccessFactors Mobile
https://play.google.com/store/apps/details?id=com.successfactors.successfactors
Version history (taken from PlayStore and from apkpure.com ):
…
(~ 29.09.2021) 6.32.1 BUG FIXES
• Fixed unexpected crashes that occurred after app was last updated
06.10.2021 6.32.2 BUG FIXES
• Improved stability
15.10.2021 6.33 NEW FEATURES
• The app no longer shows a redirection error after SSO authentication.
• The app now properly loads the Employee Profile landing screen.
© 2022
2021-10 SAP SE. All rights reserved. 271
Note 3101406 - Potential XML External Entity Injection Vulnerability in SAP
Environmental Compliance 3.0
Note 3087258 - Service Content Update is not Used for EarlyWatch Alert (or SOS)
Note 3080567 - HTTP Request Smuggling in SAP Web Dispatcher
Note 3089831 - SQL Injection vulnerability in SAP NZDT Mapping Table Framework
Note 3078312 - SQL Injection vulnerability in SAP NZDT Row Count Reconciliation
Note 2308378 - Missing Authorization check in Financial Accounting
Note 3068582 - Missing Authorization check in Financial Accounting / RFOPENPOSTING_FR
Note 3051787 - Null Pointer Dereference vulnerability in SAP CommonCryptoLib
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2021-09 SAP SE. All rights reserved. 274
Note 3087258 - Service Content Update is not Used for EarlyWatch Alert
All services which are activated for Service Content Update (SCU) are affected (see transaction
AGS_UPDATE). This usually includes the Security Optimization Service, too.
The Service Preparation Check in report RTCCTOOL verifies if the note is installed:
❑ if the patch referenced in SAP Note 3000663 has been applied to SAP Web Dispatcher
❑ but has not been applied to the SAP back-end systems (ABAP, Java, HANA).
Solution:
SAP WEB DISPATCHER 7.22 - use package from Kernel 7.22 patch 1111 instead
SAP WEB DISPATCHER 7.49 - use package from Kernel 7.49 patch 1019 instead
SAP WEB DISPATCHER 7.53 patch 827
SAP WEB DISPATCHER 7.77 patch 410
SAP WEB DISPATCHER 7.81 patch 200
SAP WEB DISPATCHER 7.84 or higher
(respective the Kernel patch if the embedded WebDispatcher is used on an application server)
© 2022
2021-09 SAP SE. All rights reserved. 276
Note 3080567 - HTTP Request Smuggling in SAP Web Dispatcher
The rule described in the workaround simply blocks requests (giving http status code 403) if it contains invalid header values:
if %{HEADER:transfer-encoding} !strcmp "" [AND]
if %{HEADER:content-length} !strcmp ""
begin
# block
RegIForbiddenUrl ^(.*) –
end
Instead of blocking using RegIForbiddenUrl you can remove the invalid header variable and continue processing the request:
# remove critical header (case insensitive)
RemoveHeader content-length
In this case you could add another header to allow logging for this detected critical event:
# add custom header to document the critical event
SetHeader X-critical-header-content-length-removed "true“
Manipulating URLs
https://help.sap.com/doc/saphelp_nw73ehp1/7.31.19/en-US/48/92688baa6b17cee10000000a421937/frameset.htm
Filtering Requests
https://help.sap.com/doc/saphelp_nw73ehp1/7.31.19/en-US/48/92670eaa6b17cee10000000a421937/frameset.htm
© 2022
2021-09 SAP SE. All rights reserved. 277
Note 3089831 - SQL Injection vulnerability in SAP NZDT Mapping Table Framework
Note 3078312 - SQL Injection vulnerability in SAP NZDT Row Count Reconciliation
➢ Deactivate the remote capability for all IUUC_REMOTE, and the listed IUUC* and DMC*
functions
© 2022
2021-09 SAP SE. All rights reserved. 278
Note 3089831 - SQL Injection vulnerability in SAP NZDT Mapping Table Framework
Note 3078312 - SQL Injection vulnerability in SAP NZDT Row Count Reconciliation
© 2022
2021-09 SAP SE. All rights reserved. 280
Note 2308378 - Missing Authorization check in Financial Accounting
If this addition is specified, the authorization of the current user to execute the called transaction is checked using the
following authorization objects before the transaction is called:
✓ The authorization object S_TCODE
✓ Any authorization object entered in the definition of the transaction code (transaction SE93). Fields of the
authorization object for which no value is specified here are not checked.
The use of the statement CALL TRANSACTION without one of the additions WITH AUTHORITY-CHECK or WITHOUT
AUTHORITY-CHECK is now obsolete.
© 2022
2021-09 SAP SE. All rights reserved. 281
Note 3068582 - Missing Authorization check in Financial Accounting
/ RFOPENPOSTING_FR (France)
Transaction FAGL_FR_03 = report RFOPENPOSTING_FR now checks for the authority objects
F_BKPF_BLA, F_BKPF_BUK, F_FAGL_LDR
In case users are not allowed anymore to execute the report, you need to adjust the user’s roles.
Use transaction SUIM to search for roles having transaction FAGL_FR_03 (none found) or
authorization object F_SKA1_BUK (multiple found) to get candidates for updates.
In transaction SU22 (SAP) for transaction FAGL_FR_03, the authority Default Values (SAP) are
maintained but only in the Support Package. Reuse this data for transaction SU24 (customer).
© 2022
2021-09 SAP SE. All rights reserved. 282
Note 3068582 - Missing Authorization check in Financial Accounting
/ RFOPENPOSTING_FR (France)
You only need to maintain transaction SU24 (customer) if you use or plan to use this data as
authorization default values in roles, i.e. if you have or plan to have transaction FAGL_FR_03
in a role menu. (An additional customizing transport is required.)
Authorization Object Field Added values
F_BKPF_BLA ACTVT 03 (display), 10 (post)
F_BKPF_BUK ACTVT 03 (display), 10 (post)
F_FAGL_LDR ACTVT 03 (display)
F_SKA1_BUK ACTVT 03 (display)
,03
© 2022
2021-09 SAP SE. All rights reserved. 283
Note 3051787 - Null Pointer Dereference vulnerability in SAP
CommonCryptoLib
The CommonCryptoLib gets updates regularly, most cases it is about features and fixes and
sometimes about security vulnerabilities:
You can think about updating just the CommonCryptoLib, however, we recommend to use the bundles
instead.
For SAP NetWeaver AS ABAP, AS Java and ABAP Platform implement the SP Stack Kernel or the
patch via file dw_utils.sar
For SAP SSO, the correction is included in SAPSSOEXT. There is no separate “Support Package
Patches” entry.
The SAP Web Dispatcher, SAP Host Agent, and SAP Content Server require an update.
For SAP HANA and SAP XSA you need an revision update as it is not possible to update just the
(multiple) cryptolibs.
© 2022
2021-09 SAP SE. All rights reserved. 285
August 2021
Topics August 2021
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2021-08 SAP SE. All rights reserved. 287
Note 3058553 - Multiple Vulnerabilities in SAP Cloud Connector
Solution: Fixes are available as of SAP Cloud Connector 2.13.2. Upgrade your existing Cloud
Connector installation to fixed version.
Description provided in
https://help.sap.com/viewer/cca91383641e40ffbe03bdc78f00f681/Cloud/en-US/7a7cc373019b4b6eaab39b5ab7082b09.html
© 2022
2021-08 SAP SE. All rights reserved. 288
Note 3058553 - Multiple Vulnerabilities in SAP Cloud Connector
How to get the installation files of SAP Cloud Connector
© 2022
2021-08 SAP SE. All rights reserved. 289
Note 3058553 - Multiple Vulnerabilities in SAP Cloud Connector
How to update SAP Cloud Connector
Previous settings and configurations are automatically preserved, however, make sure to have the
configuration as backup.
© 2022
2021-08 SAP SE. All rights reserved. 290
Note 3058553 - Multiple Vulnerabilities in SAP Cloud Connector
How to update SAP Cloud Connector
➢ For portable version, remove the current version and recreate it with the fixed version
(make sure you choose the previous installation directory again).
Consider to replace the portable version with an installed version for productive use.
© 2022
2021-08 SAP SE. All rights reserved. 291
Note 3058553 - Multiple Vulnerabilities in SAP Cloud Connector
How to find the current Cloud Connector version in your environment
a) Locally per installation:
Identify the current version of Cloud Connector using cloud connector administration WebGui
➢ Access cloud connector via web browser, https://hostname:8443 (respective custom port)
© 2022
2021-08 SAP SE. All rights reserved. 292
Note 3058553 - Multiple Vulnerabilities in SAP Cloud Connector
How to find the current Cloud Connector version in your environment
b) Centrally:
Identify the Cloud Connector
version using SAP BTP Cockpit
© 2022
2021-08 SAP SE. All rights reserved. 293
Note 3058553 - Multiple Vulnerabilities in SAP Cloud Connector
How to find the current Cloud Connector version in your environment
b) Centrally:
Identify the Cloud Connector
version using SAP BTP Cockpit
© 2022
2021-08 SAP SE. All rights reserved. 294
Note 3058553 - Multiple Vulnerabilities in SAP Cloud Connector
How to find the current Cloud Connector version in your environment
c) Centrally in LMDB:
Searching for “cloud connector” or system type CLOUD_CONN you find registered installations
easily, but you do not get information about the installed version:
© 2022
2021-08 SAP SE. All rights reserved. 295
Note 3058553 - Multiple Vulnerabilities in SAP Cloud Connector
How to find the current Cloud Connector version in your environment
You could find information about the installed version with filter for
Group Source = SapOSCol
Store Name = HOST_SOFTWARE_PACKAGES
Configuration Item = “Cloud Connector”
© 2022
2021-08 SAP SE. All rights reserved. 296
Note 3058553 - Multiple Vulnerabilities in SAP Cloud Connector
How to find the current Cloud Connector version in your environment
© 2022
2021-08 SAP SE. All rights reserved. 297
Note 3078312 - SQL Injection vulnerability in SAP NZDT Row Count
Reconciliation
© 2022
2021-08 SAP SE. All rights reserved. 299
Link list UCON
Presentation
Blogs
UCON RFC Basic Scenario - Guide to Setup and Operations (updated in 2021)
https://archive.sap.com/documents/docs/DOC-57565
https://www.sap.com/documents/2015/07/a494b08e-5b7c-0010-82c7-eda71af511fa.html
Articles
SAP Insider: Secure Your System Communications with Unified Connectivity (2014)
https://archive.sap.com/documents/docs/DOC-51003
https://www.sap.com/documents/2015/07/94c4cb8f-5b7c-0010-82c7-eda71af511fa.html
© 2022
2021-08 SAP SE. All rights reserved. 300
Link list UCON
© 2022
2021-08 SAP SE. All rights reserved. 301
Link list UCON
Correction Notes (Application component BC-MID-RFC or BC-MID-UCO)
Note 2802262 - RFC Server Side UCON Blocklist check is not executed (March 2021)
Kernel patch for 7.77
Note 2755791 - Client-side UCON blocklist check active by default (March 2021)
Kernel patch for 7.74 or higher
Apply the kernel patch or change the profile parameter ucon/rfc/check_blacklist from 3 to 1.
Note 2532437 - External calls are slow when UCON/Blocklist is active (March 2021)
Kernel patch for 7.49 or higher
Apply Kernel patch to get better performance or deactivate the client side blocklist check by setting
ucon/rfc/check_blacklist to 1.
Note 3010862 - UCON - RFC Callback SNC not detected (January 2021)
Kernel patch for 7.49 or higher
Note 2370910 - Blocklist/UCON-Checking don't allow local remote function calls (January 2021)
Kernel patch for 7.49 or higher
Note 2993452 - t/qRFC UCON Check is performed without SNC even if called with SNC (November 2020)
Kernel patch for 7.49 or higher
© 2022
2021-08 SAP SE. All rights reserved. 302
UCON setup
Profile parameters:
ucon/rfc/active = 1 Activate RFC Service Runtime Checks
ucon/rfc/check_blacklist = 1 (inbound) Activate blacklist check for RFC-call
ucon/websocketrfc/active = 1 Activate RFC over WebSocket Runtime Checks
(in new releases only)
Schedule the batch job SAP_UCON_MANAGEMENT that selects and persists the RFC statistic
records required by the UCON phase tool on the database (see note 2044302 in 7.40 respective
note 2190119 as of 7.50).
© 2022
2021-08 SAP SE. All rights reserved. 303
Note 3072920 - Cross-Site Scripting (XSS) vulnerability in SAP
NetWeaver Enterprise Portal
Support Package Patches
EP APPLICATION EXTENSIONS 7.30 SP021 000001 RTC SP 21: 30.11.2020 age: 10 month
No patches for older versions because of “end of mainstream maintenance” on 31.12.2020
EP APPLICATION EXTENSIONS 7.31 SP028 000001 RTC SP 28: 16.12.2020 age: 9 month
No patches for older versions because of “end of mainstream maintenance” on 31.12.2020
EP APPLICATION EXTENSIONS 7.40 SP023 000001 RTC SP 23: 16.12.2020 age: 9 month
No patches for older versions because of “end of mainstream maintenance” on 31.12.2020
EP APPLICATION EXTENSIONS 7.50 SP016 000001 RTC SP 16: 18.09.2019 age: 23 month
EP APPLICATION EXTENSIONS 7.50 SP017 000001 RTC SP 17: 28.02.2020 age: 18 month
EP APPLICATION EXTENSIONS 7.50 SP018 000001 RTC SP 18: 18.05.2020 age: 15 month
EP APPLICATION EXTENSIONS 7.50 SP019 000009 RTC SP 19: 04.09.2020 age: 11 month
EP APPLICATION EXTENSIONS 7.50 SP020 000004 RTC SP 20: 02.03.2021 age: 5 month
EP APPLICATION EXTENSIONS 7.50 SP021 000003 RTC SP 21: 02.06.2021 age: 2 month
EP APPLICATION EXTENSIONS 7.50 SP022 000000
EP APPLICATION EXTENSIONS 7.50 SP023 000000
End of maintenance 31.12.2027
© 2022
2021-08 SAP SE. All rights reserved. 304
Note 3072920 - Cross-Site Scripting (XSS) vulnerability in SAP
NetWeaver Enterprise Portal
You find the dates for “end of mainstream maintenance” in the Product Availability Matrix (PAM)
https://support.sap.com/pam
© 2022
2021-08 SAP SE. All rights reserved. 305
Note 3072920 - Cross-Site Scripting (XSS) vulnerability in SAP
NetWeaver Enterprise Portal
Other references:
https://support.sap.com/securitynotes
“for all new SAP Security Notes with high or very high severity we deliver fix for Support Packages shipped
within the last 24 months* for the versions under Mainstream Maintenance and Extended Maintenance.”
The PPMS is SAP internal, therefore you use the Product Availability Matrix (PAM) instead:
https://support.sap.com/pam
© 2022
2021-08 SAP SE. All rights reserved. 306
Note 3057378 - Missing Authentication check in SAP Web
Dispatcher
Update WebDispatcher, i.e. if you are using Client Certificates for authentication:
Web Dispatcher
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=414089394
→
How to Configure SAP Web Dispatcher to Forward SSL Certificates for X.509 Authentication
https://wiki.scn.sap.com/wiki/x/IiaKGw
© 2022
2021-08 SAP SE. All rights reserved. 308
Note 3016478 - HANA Audit Policies for S/4HANA
Management via HANA Cockpit
© 2022
2021-08 SAP SE. All rights reserved. 309
Note 3016478 - HANA Audit Policies for S/4HANA
Management via HANA Cockpit
© 2022
2021-08 SAP SE. All rights reserved. 310
Note 3016478 - HANA Audit Policies for S/4HANA
Setup Wizard
© 2022
2021-08 SAP SE. All rights reserved. 311
July 2021
Topics July 2021
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2021-07 SAP SE. All rights reserved. 313
SAP Insider: The Power of Prevention
In our new normal of remote and cloud environments and rising cyber risk from more sophisticated
threat actors, it is more critical than ever for organizations to prioritize their patching strategy. This
article explains how patching and awareness can fortify SAP systems against hacks.
© 2022
2021-07 SAP SE. All rights reserved. 314
Note 3066437 - SAP Support Package Stack Kernel 7.53 Patch 801
SP Stack Kernel 753 PL 801 (release note 3066437) replaces the SP Stack Kernel 753 PL 800
(release note 3017467) in order to enable the customers to apply the priority very high Security
Note 3007182 with an SP Stack Kernel.
Limitation: You cannot use the Rolling Kernel Switch procedure (see Note 3046390)
Further corrections within this patch:
• Note 3032624 - Memory Corruption in SAP NetWeaver AS ABAP and ABAP Platform
• Note 3000663 - HTTP Request Smuggling in SAP Web Dispatcher and Internet Communication Manager
• CommonCryptoLib was updated to version 8.5.39. For details see Note 3051811
• Several corrections for kernel regressions. For details see Note 3066437
You can use SP Stack Kernel 753 PL 801 plus dw824+ to implement additional corrections.
© 2022
2021-07 SAP SE. All rights reserved. 315
Note 3000663 - HTTP Request Smuggling in SAP Web Dispatcher
and Internet Communication Manager
HANA
© 2022
2021-07 SAP SE. All rights reserved. 316
Note 3000663 - HTTP Request Smuggling in SAP Web Dispatcher
and Internet Communication Manager
WebDispatcher
The solution was published in Dec 2020 - March 2021 depending on the release
(insufficient patch level), patch level of solution → including side effect solving note 3027971
© 2022
2021-07 SAP SE. All rights reserved. 317
Note 3000663 - HTTP Request Smuggling in SAP Web Dispatcher
and Internet Communication Manager
Kernel (ICM)
SAP KERNEL 7.22 patch (1021), 1022 or stack kernel 1100 09.07.2021
SAP KERNEL 7.49 patch (938), 941 → 946 or stack kernel 1000 25.05.2021
SAP KERNEL 7.53 patch (724), 810 or stack kernel 801 plus dw824+
SAP KERNEL 7.73 patch 331 → 334 or stack kernel 400 06.04.2021
SAP KERNEL 7.77 patch (318), 323 → 328 or stack kernel 400 in July/August
SAP KERNEL 7.81 patch (29), 110 or stack kernel 200 in August/September
SAP KERNEL 7.82 patch (17), 21 → 23
SAP KERNEL 7.83 patch (6), 11 → 14
SAP KERNEL 7.84 no security patch → 13
(insufficient patch level), patch level of solution → including side effect solving note 3027971
Medium probity Kernel security note 3032624 for disp+work requires slightly higher patch levels.
© 2022
2021-07 SAP SE. All rights reserved. 318
Note 3000663 - HTTP Request Smuggling in SAP Web Dispatcher
and Internet Communication Manager
You find the side effect solving note 3027971 in “Content Info” file (but not the security note.)
© 2022
2021-07 SAP SE. All rights reserved. 319
Note 3066316 - Missing authorization check in SAP CRM ABAP
Keep in mind: This logical file name (directory) MARKETING_FILES is still in use by background
report CRM_MKTTGGRP_EXPORT_BATCH which you can use to export campaign data.
© 2022
2021-07 SAP SE. All rights reserved. 320
Note 3016478 - HANA Audit Policies for S/4HANA
➢ Catch events related to security configuration and log actions related to security
➢ No unnecessary redundancies
© 2022
2021-07 SAP SE. All rights reserved. 322
Note 3016478 - HANA Audit Policies for S/4HANA
They are identical to the audit policies provided by "SAP HANA Cockpit Audit Policy Wizard"
(starting with SAP HANA Cockpit 2.0 SP13).
These policies are useful and recommended in any case. For new installations or for conversion (but
not for updates) you get these Security-by-Default settings if no audit policy is defined yet.
© 2022
2021-07 SAP SE. All rights reserved. 323
Note 3016478 - HANA Audit Policies for S/4HANA
These policies vary with the usage of the SAP HANA DB and cannot be defined identical for all
systems (i.e. replace placeholder <SAPABAP1> with list of real names).
© 2022
2021-07 SAP SE. All rights reserved. 324
Note 3016478 - HANA Audit Policies for S/4HANA
© 2022
2021-07 SAP SE. All rights reserved. 325
Note 3053829 - SOS: No or wrong check results about profile
parameters for combined ABAP/HANADB systems
© 2022
2021-07 SAP SE. All rights reserved. 326
Note 3053829 - SOS: No or wrong check results about profile
parameters for combined ABAP/HANADB systems
Samples about affected checks:
▪ Password Logon is at Least Partly Allowed (0139)
▪ Password Policy (+ sub checks 0009, 0127, ...)
(These chapters are suppressed as well if no password logon is allowed according to check 0139)
▪ Multiple Logons Using the Same User ID Is Not Prevented (0138)
▪ SSO Ticket Can Be Sent via an Unsecured Connection (0608)
▪ Secure System Internal Communication (BA091)
▪ RFC Gateway Security Properties (BA079)
▪ Enabling an Initial Security Environment (BA080)
▪ RFC Gateway Access Control Lists (BA081)
▪ Separation of Internal and External Message Server Communication (BA084)
▪ Message Server Access Control List (BA086)
▪ Sending Trace Data to Remote Client (0169)
▪ Security Audit Log is not active (0170)
(This check still shows another issue if you are using the new ‘Kernel Parameters’ as of SAP_BASIS 7.50
instead of the profile parameters to configure the Security Audit Log)
© 2022
2021-07 SAP SE. All rights reserved. 327
June 2021
Topics June 2021
Notes 3020104 3020209 3021197 - Memory Corruption vulnerability in SAP NetWeaver ABAP
Note 3007182 - Improper Authentication in SAP NetWeaver ABAP Server and ABAP Platform
Note 3026990 - RFC Logon - New Internal Logon Ticket - Increased Compatibility Level
How to patch the Kernel
Kernel version vs. CommonCryptoLib version
CCDB-Read-API
Configuration Reporting for Kernel version and CryptoLib version
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2021-06 SAP SE. All rights reserved. 329
Notes 3020104 3020209 3021197 - Memory Corruption vulnerability
in SAP NetWeaver ABAP
All these notes solve similar vulnerabilities in different components of the Kernel:
Note 3020104 Note 3020209 + Note 3031464 Note 3021197 Note 3007182
Component Enqueue Server RFC Gateway RFC Gateway disp+work ABAP & disp+work
Note 3020104 Note 3020209 + Note 3031464 Note 3021197 Note 3007182 + Side effect notes
Component Enqueue Server RFC Gateway RFC Gateway disp+work ABAP & disp+work + Note 3030604
Note 3046390 - Incorrect SAP compatibility level for SAP executables on Windows prevents
rolling kernel switch (RKS)
Relevant for kernel 7.49 and higher
Note 3050126 - Internal RFC fails due to time difference between database and application
server
Relevant for all kernel releases, no support for kernel 7.73 anymore, therefore go for a release
update to kernel 7.77
© 2022
2021-06 SAP SE. All rights reserved. 334
How to patch the Kernel
➢ Apply the latest SP Stack Kernel if it already contains the correction. For the list of current SP Stack Kernels, see
Note 2083594 (Kernel Versions and Kernel Patch Levels).
➢ Apply the hotfix only if you are experiencing a serious error that is not yet corrected by the latest SP Stack Kernel.
Yes, this is the case in case of serious security vulnerabilities!
➢ Review the regression note for the required patch level before installing the kernel patch. For details, see
Note 1802333 (Finding information about regressions in the Kernel using search term KRNL<release>PL).
➢ For instructions on how to download and install kernel patches, see Note 19466 (Downloading SAP kernel patches).
➢ The paper Update Strategy for the Kernel of the Application Server ABAP in On Premise Landscapes provides
detailed information on the SAP recommendations.
➢ Rolling Kernel Switch (RKS)
https://help.sap.com/viewer/1ba3197c1aa7489882770103e3a610dc/7.40.18/en-US
“The rolling kernel switch (RKS) is an automated procedure that enables the kernel in an ABAP system to be
exchanged without any system downtime. RKS can also be used to make parameter changes while the system is
running. Usually, RKS only causes minimal restrictions for users of the system.”
The RKS is available as of Kernel release 7.41 and SAP_BASIS 7.40 SP 5
Limitation see notes 953653 and 2576697 → Restart is required
© 2022
2021-06 SAP SE. All rights reserved. 335
System Recommendations shows Kernel notes for Java systems
Parts of the Kernel are part of an Java Application Server too, e.g. the message server or the RFC gateway but not
disp+work. Therefore you find the Kernel in the LMDB (and PPMS) for Java systems, too:
In such a case you will see these notes in application System Recommendations for Java systems, too.
© 2022
2021-06 SAP SE. All rights reserved. 336
Kernel version vs. CommonCryptoLib version
The CommonCryptoLib is installed everywhere. It is part of the Kernel bundle as well, however, it is somehow loosely
coupled with the Kernel and it might have happened that you have missed updating the CommonCryptoLib.
Whenever you plan Kernel updates for you complete system landscape you inspect the installed version of the Kernel
beforehand.
You should have a look to the installed version of the CommonCryptoLib, too.
Use application Change Reporting respective transaction CCDB in the SAP Solution Manager to inspect the
Configuration Stores SAP_KERNEL und CRYPTOLIB.
© 2022
2021-06 SAP SE. All rights reserved. 338
Configuration Reporting for Kernel version and CryptoLib version
SAP_KERNEL
CRYPTOLIB requires authorization for AI_CCDB_SC
CCL
KERN_COMP_TIME
KERN_PATCHLEVEL
KERN_REL
(You could try to add ABAP_COMP_RELEASE as well but this produces a poor result.)
© 2022
2021-06 SAP SE. All rights reserved. 340
Configuration Reporting for Kernel version and CryptoLib version
Checked [UTC]
ConfigStore
Host or Instance
Path
© 2022
2021-06 SAP SE. All rights reserved. 341
Configuration Reporting for Kernel version and CryptoLib version
Limitations:
• Filter values, which you choose later, are not part of the bookmark
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2021-05 SAP SE. All rights reserved. 344
Use of Configuration Validation for stand-alone Web Dispatcher?
Yes, that’s true, stand-alone Web Dispatchers do not feed data into store ABAP_INSTANCE_PAHI
An incomplete workaround could be, to get and inspect the profile parameter text files in stores
DEFAULT.PFL and <SID>_<Instance>_<hostname> of store group WEBDISP-PROFILE
Blog: How to monitor standalone (non-ABAP) Web Dispatcher Security in Solution Manager
https://blogs.sap.com/2021/02/10/how-to-monitor-standalone-non-abap-web-dispatcher-security-in-solution-manager/
© 2022
2021-05 SAP SE. All rights reserved. 345
Use of Configuration Validation for stand-alone Web Dispatcher?
Caveats
➢ The configuration stores of the instance profiles have individual names. You cannot
automatically address all of them within one target system
➢ The configuration stores have type “text”. Use special line content operators as described in
the blog.
Correction Instruction:
*$ Valid for : $*
*$ Software Component SAP_BASIS SAP Basis component $*
*$ Release 700 SAPKB70026 - SAPKB70032 $*
*$ Release 710 SAPKB71013 - SAPKB71019 $*
*$ Release 711 SAPKB71109 - SAPKB71114 $*
*$ Release 701 SAPKB70113 - SAPKB70117 $*
*$ Release 702 SAPKB70210 - SAPKB70217 $*
*$ Release 730 SAPKB73005 - SAPKB73013 $*
*$ Release 720 SAPKB72006 - SAPKB72007 $*
*$ Release 731 SAPKB73104 - SAPKB73116 $*
*$ Release 740 SAPKB74003 - SAPKB74011 $*
This note enables you to secure RFC connections from SAP PI to a backend system via SNC.
Implement this note i.e. if you want to encrypt all internal server-to-server connections, too.
➢ 7.31 SP 28 16.12.2020
➢ 7.40 SP 23 16.12.2020
➢ 7.50 SP 20 02.03.2021
Documentation:
Importing IDocs and RFCs
https://help.sap.com/viewer/0b9668e854374d8fa3fc8ec327ff3693/7.5.20/en-US/2ba48f3c685bc358e10000000a11405a.html
© 2022
2021-05 SAP SE. All rights reserved. 348
Notes 3049661, 3049755 - Vulnerabilities in SAP Business One,
version for SAP HANA (Business-One-Hana-Chef-Cookbook)
SAP Business One Product Support
https://partneredge.sap.com/en/products/business-one/support.html
https://community.sap.com/topics/business-one
Note Search
https://apps.support.sap.com/sap/bc/ui5_ui5/svt/sbos_notesearch/index.html
© 2022
2021-05 SAP SE. All rights reserved. 349
Notes 3049661, 3049755 - Vulnerabilities in SAP Business One,
version for SAP HANA (Business-One-Hana-Chef-Cookbook)
Solution: Update the cookbook to latest version 0.1.20 from 06.05.2021 and then reinstall the
system using this updated cookbook to get tightened file permissions
© 2022
2021-05 SAP SE. All rights reserved. 350
Secure LDAP connection via ICM
Note 2785547 - Introduction of the ICM LDAP Plug-In
Application Server
Applications using
Directory Services
© 2022
2021-05 SAP SE. All rights reserved. 352
Secure LDAP connection via ICM
Note 2785547 - Introduction of the ICM LDAP Plug-In
Application Server
Applications using
Directory Services
© 2022
2021-05 SAP SE. All rights reserved. 353
Secure LDAP connection via ICM
Note 2785547 - Introduction of the ICM LDAP Plug-In
Customizing
© 2022
2021-05 SAP SE. All rights reserved. 354
Secure LDAP connection via ICM
Note 2785547 - Introduction of the ICM LDAP Plug-In
You can replace old LDAP connector with “LDAP connection via ICM” as of
SAP_BASIS 7.50 SP 16, 7.51 SP 9, 7.52 SP 5, 7.53 SP 3 with Kernel 7.53 patch 510 or higher
No other changes in configuration needed, however, just using the new connection via ICM
does not give you an encrypted communication channel: you have to secure the connection
using STARTTLS or LDAPS, too
Note 2844331 - Product Assistance on ICM LDAP Plug-In for ABAP Platform 7.53 SP03
Note 2801455 - ICM LDAP: Fix STARTTLS memory leak (only relevant for Kernel 7.77)
© 2022
2021-05 SAP SE. All rights reserved. 355
Secure LDAP connection via ICM
Transaction LDAP → Server
+
+
© 2022
2021-05 SAP SE. All rights reserved. 358
LDAP Connection though ICM
The LDAP Plug-in of the ICM requires the HTTP plug-in up to Kernel 7.81.
As of Kernel 7.82 you can enable (default) or disable specific outbound protocols for the ICM
using new dynamic boolean profile parameters:
© 2022
2021-05 SAP SE. All rights reserved. 359
April 2021
Topics April 2021
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2021-04 SAP SE. All rights reserved. 361
Active Cyberattacks on Mission-Critical SAP Applications
https://onapsis.com/active-cyberattacks-mission-critical-sap-applications
Note 1445998 - Disabling invoker servlet CVE-2010-5326 Critical Jul 20, 2011
Note 2234971 - Directory traversal in AS Java Monitoring CVE-2016-3976 High Mar 8, 2016
Note 2258786 - Potential information disclosure relating to SAP Web Administration Interface
CWE-200 Medium Mar 07, 2016
Note 2296909 - Denial of service (DOS) vulnerability in BPM CVE-2016-9563 Medium Aug 08, 2016
Note 2547431 - Directory Traversal vulnerability in Internet Sales CVE-2018-2380 Medium Feb 13, 2018
Note 2890213 - Missing Authentication Check in SAP Solution Manager CVE-2020-6207 Critical Mar 10, 2020
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA (LM Configuration Wizard)
CVE-2020-6287 Critical Jul 14, 2020
Note 2939665 - Disable/Enable LM Configuration Wizard | Critical API's in LM Configuration Wizard
Protecting Standard Users CWE-307 Critical
https://help.sap.com/viewer/12a2bc096c53101493cef874af478673/7.0.37/en-US/3ecdaccbedc411d3a6510000e835363f.html
about CTB_ADMIN see also:
Troopers 2016: An easy way into your multi-million dollar SAP systems: An unknown default SAP account
https://troopers.de/events/troopers16/603_an_easy_way_into_your_multi-million_dollar_sap_systems_an_unknown_default_sap_account/
© 2022
2021-04 SAP SE. All rights reserved. 362
2016-05
Note 1445998 - Disabling invoker servlet 2015-10
© 2022
2021-04 SAP SE. All rights reserved. 364
Note 2258786 - Potential information disclosure relating to SAP Web
Administration Interface 2016-03
Configuration:
Deactivate support of public monitoring information in the web administration interface.
Set the subparameter ALLOWPUB of the profile parameter icm/HTTP/admin_<xx> to FALSE.
Then, access to administration pages without a logon is deactivated completely.
Related Notes:
Note 870127 - Security note for SAP Web Dispatcher
Note 2260323 - Internet Communication Manager (ICM) 7.20 security settings
© 2022
2021-04 SAP SE. All rights reserved. 365
Note 2296909 - Denial of service (DOS) vulnerability in BPM
© 2022
2021-04 SAP SE. All rights reserved. 366
Note 2547431 - Directory Traversal vulnerability in Internet Sales
© 2022
2021-04 SAP SE. All rights reserved. 367
Note 2890213 - Missing Authentication Check in SAP Solution 2020-11
Manager 2020-03
© 2022
2021-04 SAP SE. All rights reserved. 368
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard) 2020-09
2020-08
2020-07
In addition: Implement firewall rules for URL blocking as described in note 1589525
or develop filter rules for administrative requests according to note 451753
Short time: Implement the patch for Software Component LMCTC as described in the note.
The patch does not depend on any other component and you can it deploy online (without
downtime or restart) using telnet (see KBA 1715441) or if possible SUM (see Blog and Note 1641062).
Software Download Example:
https://launchpad.support.sap.com/#/softwarecenter/search/LM%2520CONFIGURATION%2520WIZARD%25207.50
Scheduled: Schedule a combined update of all Java components. You can take the time for
preparation, if you have deactivated the vulnerability described by this note.
© 2022
2021-04 SAP SE. All rights reserved. 369
Protecting Standard Users
Report RSUSR003
2997708 - Support Solution Manager Java Servers Without a P4S Port - - patch 11 X
© 2022
2021-04 SAP SE. All rights reserved. 371
Note 3040210 - Remote Code Execution vulnerability in Source
Rules of SAP Commerce
Version 17 from 13.04.2021 is the first published version.
© 2022
2021-04 SAP SE. All rights reserved. 372
Note 3036436 - Potential XXE Vulnerability in SAP Process
Integration (ESR Java Mappings)
This is a knowlege-sharing note about securing custom-made Java mappings for XML
documents by disabling DTD:
setFeature("http://apache.org/xml/features/disallow-doctype-decl", true)
The topic is relevant for any kind of Java programs using XML, e.g. in products like SAP PO,
MII Workbench, etc.
Java mapping
https://help.sap.com/viewer/0b9668e854374d8fa3fc8ec327ff3693/7.5.20/en-US/4bf40fddc0c33de4e10000000a42189e.html
• KBA 2879503 - AS Java is not getting started with exit code 2150 - DOCTYPE is disallowed
(Issue during upgrade)
© 2022
2021-04 SAP SE. All rights reserved. 374
Note 2818965 - Clickjacking vulnerability in Runtime Workbench of
SAP Process Integration
The correction of the note enables a specific application of SAP Process Integration to use the
general Clickjacking Protection for JSP on the Application Server Java
Related Notes:
Note 2286679 - Clickjacking Framing Protection in JAVA
Note 2170590 - Central Whitelist maintenance & activation
Note 2263656 - HTMLB
Note 2290783 - Java Server Pages
© 2022
2021-04 SAP SE. All rights reserved. 375
Note 3039649 - Unquoted Search Path in SAPSetup
SAPSetup Guide
https://help.sap.com/doc/1b770fc9e71e4062851ffe7de158007d/9.0.105.0/en-US/SAPSetup_Guide.pdf
© 2022
2021-04 SAP SE. All rights reserved. 376
Note 3036679 - Update 1 to Security Note 1576763: Potential
information disclosure relating to usernames
Note 1576763 introduced a switched authorization check for TH_USER_LIST in Oct. 2011
➢ Release 4.6C – 7.20: Off by default but you can activate the new check
➢ Release 7.30: Off by default but you couldn’t activate the new check
This is now solved with Note 3036679
➢ Release 7.31: On by default but you can de-activate the new check
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2021-03 SAP SE. All rights reserved. 379
Blogs: Java Parameter service/protectedwebmethods
Profile Parameters:
service/protectedwebmethods
service/hostname service/http/hostname service/https/hostname
service/http/acl_file service/https/acl_file
service/admin_users service/admin_group service/sso_admin_user_<xx>
© 2022
2021-03 SAP SE. All rights reserved. 380
Blogs: RFC Gateway security
© 2022
2021-03 SAP SE. All rights reserved. 381
Note 3017378 - Possible authentication bypass in SAP HANA LDAP
scenarios
LDAP Servers used for authentication should not allow unauthenticated authentication
Overview (Dec 2018) Product Can be disabled Disabled by default
Red Hat Directory Server Yes Yes
OpenLDAP Yes Yes
Novell eDirectory Yes No
Oracle/Sun Directory Server Yes Yes
Microsoft AD LDS/ADAM Yes* (Server 2019+) No
Microsoft Active Directory Yes* (Server 2019+) No
Apache is not affected
https://directory.apache.org/apacheds/advanced-ug/4.1.1.3-unauthenticated-authn.html
LDAP: Disable Unauthenticated Auth, but keep Anonymous Auth (May 2015)
https://community.microfocus.com/t5/eDirectory-User-Discussions/LDAP-Disable-Unauthenticated-Auth-
but-keep-Anonymous-Auth/td-p/2200547
AD, LDS and LDAP unauthenticated binds: A series of unfortunate security events (Jan 2017)
https://blog.lithnet.io/2017/01/ad-lds-and-ldap-unauthenticated-binds.html
Disabling Unauthenticated Binds in Active Directory (Dec 2018)
https://blog.lithnet.io/2018/12/disabling-unauthenticated-binds-in.html
© 2022
2021-03 SAP SE. All rights reserved. 382
Note 3022622 - Code injection vulnerability in SAP Manufacturing
Integration and Intelligence
SAP MII allows developer users having at least role SAP_XMII_Developer to create dashboards
(which is a kind of limited development activity).
Such a developer could attack the system by injecting malicious JSP leading e.g. to remote OS code
execution on the server.
© 2022
2021-03 SAP SE. All rights reserved. 383
Note 3022622 - Code injection vulnerability in SAP Manufacturing
Integration and Intelligence
SAP MII - Security Guide
Authorizations
https://help.sap.com/viewer/9e5b0e960a9f49828522215c3fa14e71/15.4/en-US/c1eb0758e9219244e10000000a4450e5.html
Roles SAP_XMII_Developer, SAP_XMII_Administrator, and SAP_XMII_Super_Administrator
“The Source Code tab (html, css, and client-side Javascript) is hidden by default. Only users assigned
with action XMII_SSCE_DEVELOPER can edit the source code.”
© 2022
2021-03 SAP SE. All rights reserved. 384
Note 3022622 - Code injection vulnerability in SAP Manufacturing
Integration and Intelligence
and
MDO Lifecycle (jobs)
https://help.sap.com/viewer/d70c3ac3566b41dd896cd7cecc94e14a/15.4/en-US/4cc8daa98e9b60c5e10000000a15822d.html
use the
Credential Store
https://help.sap.com/viewer/d70c3ac3566b41dd896cd7cecc94e14a/15.4/en-US/4c983ef0311160c4e10000000a15822d.html
➢ You can verify role assignments and usage of these technical users with stored credentials.
(There exist a special “Usage” tab.)
© 2022
2021-03 SAP SE. All rights reserved. 385
Note 3022422 - Missing Authorization Check in SAP NetWeaver AS
JAVA (MigrationService)
Do you need to run a full Support Package update via SUM or is it sufficient just to apply
patches?
„Аs a final solution, you have to patch your systems with a new version of the J2EE-APPS.SCA,. ...
NOTE: This solution is an offline deployment that requires a restart of your systems.”
“3. Is it possible to upgrade J2EE-APPS only or should the whole stack be upgraded?
J2EE-APPS should be applied together with all its dependencies according to "SCA Dependency
Analysis" tool.”
You find the "SCA Dependency Analysis" in the SAP Support Portal when you navigate to the
download page for Java packages.
See Note 1974464 - Information on SCA Dependency Analysis for Java download objects
© 2022
2021-03 SAP SE. All rights reserved. 386
Note 3022422 - Missing Authorization Check in SAP NetWeaver AS
JAVA (MigrationService)
https://apps.support.sap.com/sap(bD1lbiZjPTAwMQ==)/support/swdc/notes/index.do?cvnr=73554900100200001504&support_package=SP015&patch_level=000014
© 2022
2021-03 SAP SE. All rights reserved. 387
Note 3022422 - Missing Authorization Check in SAP NetWeaver AS
JAVA (MigrationService)
The workaround within SAP note 3030298 is sufficiently protecting the system till the next
system restart, but during the next startup of the system the system becomes vulnerable again
for the time until the deployed service is running.
That is why you should apply the permanent solution as per SAP note 3022422 the latest during
the next system restart.
You can use Maintenance Planner to download only the required patches for your system without
generating a stack xml file.
You can also use 'SAP NW Java Support Tool' to calculate dependencies as per KBA 2352717.
see KBA1715441 - Deploy/Undeploy/Force Redeploy EAR/SDA/SCA files on SAP AS JAVA
© 2022
2021-03 SAP SE. All rights reserved. 388
How to secure P4 on AS Java
© 2022
2021-03 SAP SE. All rights reserved. 389
How to secure P4 on AS Java
© 2022
2021-03 SAP SE. All rights reserved. 390
How to secure P4 on AS Java
© 2022
2021-03 SAP SE. All rights reserved. 391
Note 2574394 - Configure Diagnostics Agents with check for Client
Certificate
Solution Manager Workcenter “SAP Solution Manager Administration”
→ Agents Administration
→ Agent Admin
© 2022
2021-03 SAP SE. All rights reserved. 392
Note 2622660 - Security updates for the browser control Google
Chromium delivered with SAP Business Client
SAP Business Client 7.0 PL16 Base Score: 9.6 (Priority Hot News)
Version 49 from 26.01.2021
SAP Business Client 7.70 PL0
Chromium 87.0.4280.141 AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Medium 4.0 - 6.9
Base Score: 10.0 (Priority Hot News) Hot News 9.0 - 10.0
Version 46 from 10.11.2020 SAP Business Client 7.0 PL14 Chromium 86.0.4240.183 AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
SAP Business Client 6.5 PL22 Base Score: 8.8 (Priority High)
Version 39 from 10.03.2020 Chromium 80.0.3987.122 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
SAP Business Client 7.0 PL9
© 2022
2021-03 SAP SE. All rights reserved. 393
February 2021
Topics February 2021
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2021-02 SAP SE. All rights reserved. 395
Note 2897141 - CVE-2020-1938 'Ghostcat' Tomcat AJP Vulnerability
This note is not classified as a Security Note, even if it describes a possible security
vulnerability in Component BI-BIP-DEP
SAP BusinessObjects Business Intelligence Platform product does NOT require the use of AJP
connector, so the product itself is not affected by this vulnerability.
However, you could configure AJP on your own depending on their usage like split deployment,
reverse proxy or load balancing.
To fix this vulnerability, upgrade Apache Tomcat to a non-vulnerable version as per Apache Tomcat
documentation. If you don't use AJP and you can't upgrade Tomcat, you can disable AJP connector.
MD5 digest support in SAML assertions has been removed from SAP HANA 2 with the following
revisions:
With SAP HANA 1.0 revision 122.34, you can disable MD5 using a new parameter
saml_signature_hash_types = 'sha1,sha256' in global.ini
You can verify whether your SAML Identity Provider (IdP) still uses the MD5 algorithm by
activating the “authentication trace” on “debug” level as described in note 3024481.
➢ Remember: After completing troubleshooting, reduce the authentication trace level back to default.
© 2022
2021-02 SAP SE. All rights reserved. 397
Java Parameter service/protectedwebmethods
Solman Monitoring
SDEFAULT -ReadLogFile -ABAPReadSyslog -ListLogFilesError -J2EEGetProcessList2 -J2EEGetProcessList
SUM
DEFAULT
Reverse Tabnabbing vulnerabilities are attacks, where an page linked from the target page uses
the opener browsing context to redirect the target page to a phishing site.
SAP UI5 and Fiori Launchpad Note 3014303
Web Dynpro ABAP Note 2974582 Legit Page
<a href="example.com" target="_blank">
SAP GUI for HTML Note 2973428 Browser opens
new tab
Business Server Pages Note 2972275
WebCUIF Note 2994289
Unified Rendering (March 2021) Note 2978151
Browser Malicios Page
Web Dynpro Java (March 2021) Note 2976947 replaces content window.opener.location =
HTMLB for Java (March 2021) Note 2977001 of original tab "https://phish.example.com";
Reverse Tabnabbing vulnerabilities are attacks, where an page linked from the target page uses
the opener browsing context to redirect the target page to a phishing site.
SAP UI5 and Fiori Launchpad Note 3014303
Web Dynpro ABAP Note 2974582
Phishing Page
SAP GUI for HTML Note 2973428 Browser opens
new tab
Business Server Pages Note 2972275
WebCUIF Note 2994289
Unified Rendering Note 2978151
Browser Malicios Page
Web Dynpro Java Note 2976947 replaces content window.opener.location =
HTMLB for Java Note 2977001 of original tab "https://phish.example.com";
© 2022
2021-02 SAP SE. All rights reserved. 402
Note 3014121 - Remote Code Execution vulnerability in SAP
Commerce (cloud & on-prem)
SAP Commerce - Installing and Upgrading – System Requirements
https://help.sap.com/viewer/a74589c3a81a4a95bf51d87258c0ab15/2011/en-US/8c6b9a8186691014bd8dd9635cabfaff.html
“You manage your SAP Commerce Cloud deployments in the Cloud Portal, which enables you to control and monitor
all aspects of your SAP Commerce Cloud instances. Builds are fully automated. They are packaged as Docker nodes,
orchestrated by Kubernetes, and deployed on Microsoft Azure public cloud infrastructure. You have full control over
build configuration using build manifest files, and can connect your own GitHub repository to pull in any custom code
for your project at build time.”
Infrastructure Considerations for On-Prem SAP Commerce
https://www.sap.com/cxworks/article/432591793/infrastructure_considerations_for_on_prem_sap_commerce
No major updates concerning security features – but a strong opportunity to review existing
security settings:
➢ Check installed version (→ slides from 2016-01)
➢ Security Configuration (→ slides from 2017-04)
➢ Enable SNC Client Encryption (→ slides from 2017-05)
➢ Log unencrypted GUI /RFC (→ slides from 2015-07)
© 2022
2021-02 SAP SE. All rights reserved. 404
SAP GUI for Windows 7.70 - Chromium Edge for HTML Control
Up to Release 7.60, the SAP GUI HTML control always uses the control for Microsoft Internet
Explorer. As a result, SAP GUI may launch an Internet Explorer window.
As of Release 7.70, SAP GUI for Windows offers to embed the Microsoft WebView2 control
(Edge based on Chrome) https://docs.microsoft.com/en-us/microsoft-edge/webview2
➢ Installation required
© 2022
2021-02 SAP SE. All rights reserved. 405
January 2021
Topics January 2021
© 2022
2021-01 SAP SE. All rights reserved. 407
Q&A Notes for Security HotNews
December 2020
Note 2989075 - Missing XML Validation in SAP BusinessObjects Business Intelligence Platform (Crystal Report)
➢ -
Note 2974774 - Missing Authentication Check In SAP NetWeaver AS JAVA (P2P Cluster Communication)
➢ Note 2997167 - Missing Authentication Check In NW AS Java P2P Cluster Communication - Frequently asked questions and answers
Note 2973735 - Code Injection in SAP AS ABAP and S/4 HANA (DMIS)
➢ Note 2985806 - FAQ for SAP Note 2973735 - Code Injection vulnerability in S/4 HANA
January 2021
Note 2999854 - Code Injection in SAP Business Warehouse and SAP BW/4HANA
➢ Note 3006112 - Q&A for SAP Security Note 2999854
Note 2983367 - Code Injection vulnerability in SAP Business Warehouse (Master Data Management) and SAP BW4HANA
➢ Note 2999167 - Q&A for SAP Security Note 2983367
Note 2979062 - Privilege escalation in SAP NetWeaver Application Server for Java (UDDI Server)
➢ Note 2989299 - Frequently asked questions and answers
Note 2622660 - Security updates for the browser control Google Chromium delivered with SAP Business Client
➢ (Exception, old note which gets updated regularly.)
© 2022
2021-01 SAP SE. All rights reserved. 408
Note 2622660 - Security updates for the browser control Google
Chromium delivered with SAP Business Client
Base Score: 9.6 (Priority Hot News) Hot News 9.0 - 10.0
Version 42 from 25.08.2020 SAP Business Client 7.0 PL12 Chromium 84.0.4147.105 AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
SAP Business Client 6.5 PL22 Base Score: 8.8 (Priority High)
Version 39 from 10.03.2020 Chromium 80.0.3987.122 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
SAP Business Client 7.0 PL9
SAP Business Client 6.5 PL21 Base Score: 8.8 (Priority High)
- Chromium 79.0.3945 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
SAP Business Client 7.0 PL8
SAP Business Client 6.5 PL20 Base Score: 8.8 (Priority High)
Version 37 from 28.01.2020 Chromium 79.0.3945 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
SAP Business Client 7.0 PL7
© 2022
2021-01 SAP SE. All rights reserved. 409
Note 2983367 - Code Injection vulnerability in SAP Business
Warehouse (Master Data Management) and SAP BW4HANA
The validity of the correction instructions now covers all relevant SP levels
© 2022
2021-01 SAP SE. All rights reserved. 410
Note 2986980 - Multiple vulnerabilities in SAP Business Warehouse
(Database Interface)
Q&A Note 3005196
➢ Detection:
Inspect Workload Statistics or Security
Audit Log or use ETD to verify that the
RFC function respective the report is
not called.
© 2022
2021-01 SAP SE. All rights reserved. 412
Note 2945581 - Cross-Site Scripting (XSS) vulnerability in SAP CRM
WebClient UI
Software component WEBCUIF exists in
various ABAP system types.
© 2022
2021-01 SAP SE. All rights reserved. 413
Note 3001373 - Information Disclosure in Central Order on Cloud
Foundry
Central Order service for SAP Customer Experience solutions
Purpose: Consolidate and manage your order-related data in a central cloud-based service.
This service runs in the Cloud Foundry environment.
Manual instruction to recreate binding credentials if you have created them before 04.12.2020.
You can use service keys to generate credentials to communicate directly with a service instance.
The service key contains the URL that you use to call the APIs of the service, the client ID, and the
client secret. Note this information, as you need it in follow-on procedures.
Service keys contain authentication- and authorization-related content and have to be handled
securely.
© 2022
2021-01 SAP SE. All rights reserved. 414
Note 2911103 - SE16N: Alternative edit mode
Transaction SE16N does not offer change mode via command &SAP_EDIT anymore.
© 2022
2021-01 SAP SE. All rights reserved. 415
Note 2911103 - SE16N: Alternative edit mode
Several required notes, e.g. 2787892, 2848972, 2863410, 2867757, 2879630, 2880334, 2886898,
2905486, 2911103 with additional manual implemementation steps
+ manual steps
+ manual steps
+ manual steps
+ manual steps
+ manual steps
+ manual steps
However, on higher releases give SNOTE a try first – depending on the version of SNOTE it can
perform most or all of the manual steps automatically!
© 2022
2021-01 SAP SE. All rights reserved. 417
Note 2911103 - SE16N: Alternative edit mode
Transaction SE16N_EMERGENCY
Report RKSE16N_CD_DISPLAY
© 2022
2021-01 SAP SE. All rights reserved. 418
Note 2911103 - SE16N: Alternative edit mode
Note 2002588 - CO-OM Tools: Documentation for SE16S, SE16SL, and SE16S_CUST
...
Note 2985178 - SE16N_EMERGENCY: Explanation popup occurs even with no change of data
© 2022
2021-01 SAP SE. All rights reserved. 419
December 2020
Topics December 2020
© 2022
2020-12 SAP SE. All rights reserved. 421
SAP Focused Run – Use Cases & High Level Architecture
© 2022
2020-12 SAP SE. All rights reserved. 422
Policies for the SAP Security Baseline
Template
You can select several policies and run
them together against all connected
systems to get a complete cross-system
view.
Aggregated view per Policy
System Overview
Policies for Security Notes
Aggregated view per Policy (PatchDay)
Publication via GitHub
Policies for Security Notes
Policies for Security Notes
Example for a Policy
Manage Catalog of Policies
and active Policies
Upload Policy from GitHub
Copy&Paste raw-link
Configuration & Security Analytics (CSA) in FocusedRun
FRUN
https://support.sap.com/en/alm/focused-solutions/focused-run-expert-portal.html
© 2022
2020-12 SAP SE. All rights reserved. 435
Configuration & Security Analytics (CSA) in FocusedRun
Landing Page
https://support.sap.com/en/alm/sap-focused-run/internet-demo-system.html
Demo System
https://frun.almdemo.com/sap/bc/ui2/flp?sap-client=100&sap-language=EN#Shell-home
© 2022
2020-12 SAP SE. All rights reserved. 436
Note 2890213 - Missing Authentication Check in SAP Solution Manager
Note 2985866 - Missing Authentication Check in SAP Solution Manager
For this component you always install the latest patch of a specific Support Package.
© 2022
2020-12 SAP SE. All rights reserved. 437
Note 2983204 - Multiple Vulnerabilities in SAP Solution Manager 7.2
(User Experience Monitoring)
Related note:
➢ Note 2890213 - Missing Authentication Check in SAP Solution Manager (User-Experience Monitoring)
Make sure Single Sign-On Automatic Activity in SAP Solution Manager Configuration has been executed:
Transaction SOLMAN_SETUP → Cross Scenario Configuration → Mandatory Configuration
→ Infrastructure Preparation → (2) Setup Connectivity → (2.2) Enable Connectivity → Set Up Single Sign-On
Patches containing this particular correction: Published on
SOLMANDIAG 720 SP003 000008 12.11.2020
SOLMANDIAG 720 SP004 000017 12.11.2020
SOLMANDIAG 720 SP005 000019 19.11.2020
SOLMANDIAG 720 SP006 000019 12.11.2020
SOLMANDIAG 720 SP007 000026 04.11.2020
SOLMANDIAG 720 SP008 000024 04.11.2020
SOLMANDIAG 720 SP009 000018 28.10.2020
SOLMANDIAG 720 SP010 000009 28.10.2020
SOLMANDIAG 720 SP011 000005 04.11.2020
© 2022
2020-12 SAP SE. All rights reserved. 438
Note 2974330 - Unrestricted File Upload vulnerability in Java
(Process Integration Monitoring)
Vulnerability:
Deny of Service (DoS) for Java system in application „Send test message“ of Process Integration Monitoring
Mitigation:
Action NWA_SUPERADMIN_NWA_SENDTESTMSG is required to call the function. The action is part of most PI
administrator roles.
Configuration:
NWA → Configuration → Infrastructure → Java System Properties
Select the Applications tab and filter for application tc~lm~itsam~co~ui~nwacompmon~wd
sndTestMessage.monitor.payload.filesize.limit 5 default [MB]
sndTestMessage.monitor.payload.file.extensions txt,xml default
Logs:
If the uploaded file size is larger than the configured filesize limit property or the file extension is not listed in the
allowed extensions property an error occurs in UI and Developer Traces log:
NWA → Log Viewer (select Developer Traces view)
© 2022
2020-12 SAP SE. All rights reserved. 439
Note 2974774 - Missing Authentication Check In SAP NetWeaver AS
JAVA (P2P Cluster Communication)
KBA 2997167 - Missing Authentication Check In NW AS Java P2P Cluster Communication -
Frequently asked questions and answers
Question: “Assuming that the network is not isolated: If the MS Access Control List is configured, than
any connect attempt from another server via the join port is blocked. Correct?“
➢ Yes, if the IP or FQDN of the remote client (who wants to make a p2p connection to the join port of
some server node) is not allowed from the MS ACL, then the connection will be refused from the
accepting server node.
Workaround / extended settings:
a) Configure Message Server ACL to allow P2P connections only from trusted IP addresses
according to this topic: Security Settings for the SAP Message Server.
b) Make sure that the Join Port, opened by the P2P Server Socket, is protected on network level via
network segmentation, with firewall, or both. Furthermore, the communication between the cluster
elements must be secured via the IPsec protocol suite. For more information about cluster
communication, see: Configuring Cluster Communication Ports.
© 2022
2020-12 SAP SE. All rights reserved. 440
Note 2974774 - Missing Authentication Check In SAP NetWeaver AS
JAVA (P2P Cluster Communication)
Online Help
Technical System Landscape
© 2022
2020-12 SAP SE. All rights reserved. 442
Note 2974774 - Missing Authentication Check In SAP NetWeaver AS
JAVA (P2P Cluster Communication)
Online Help
Transport Layer Security
© 2022
2020-12 SAP SE. All rights reserved. 443
Note 2974774 - Missing Authentication Check In SAP NetWeaver AS
JAVA (P2P Cluster Communication)
Internal Port Value s0, s1, s2,…, s15 is the number of the server process
NN is the instance number
Server Join Port For s0 = 5NN20; for s1 = 5NN25; for s2 = 5NN30; etc. for s15 = 5NN95
Server Debug Port For s0 = 5NN21; for s1 = 5NN26; for s2 = 5NN31; etc. for s15 = 5NN96
DSR Infrastructure For s0 = 5NN22; for s1 = 5NN27; for s2 = 5NN32; etc. for s15 = 5NN97
© 2022
2020-12 SAP SE. All rights reserved. 444
Note 2974774 - Missing Authentication Check In SAP NetWeaver AS
JAVA (P2P Cluster Communication)
ms/acl_file_ext External port on the message server, which all clients can use.
This port is set with parameter rdisp/msserv.
ms/acl_file_extbnd Port number under which an external binding program (icmbnd) has to log
on to in order to bind a port.
This port is set with parameter rdisp/extbnd_port.
ms/server_port_<xx> This parameter identifies the message server port at which HTTP(S)
requests can arrive.
© 2022
2020-12 SAP SE. All rights reserved. 445
Note 2983367 - Code Injection vulnerability in SAP Business
Warehouse (Master Data Management) and SAP BW4HANA
© 2022
2020-12 SAP SE. All rights reserved. 447
Note 2978768 - Inproper authentication in SAP HANA database
© 2022
2020-12 SAP SE. All rights reserved. 448
System Recommendations – Recalculation for some notes
Unfortunately due to a bug several non ABAP security notes released on 08.12.2020 have
incorrect patch level. We have fixed the bug and corrected the data on backbone.
To re-pushing them to customer, we modified the released date of affected notes in backbone
to 10.12.2020. The corrected notes have been recalculated automatically, i.e. if the background
job is scheduled daily basis (no extra action is required).
Number System type Title
2971163 JAVA Missing Encryption in SAP NetWeaver AS Java (Key Storage Service)
2971180 DISCMGMS Formula Injection in SAP Disclosure Management
2974330 JAVA Unrestricted File Upload vulnerability in SAP NetWeaver Application Server for Java (Process
Integration Monitoring)
2974774 JAVA Missing Authentication Check In SAP NetWeaver AS JAVA (P2P Cluster Communication)
2978768 HANABD Improper authentication in SAP HANA database
2983204 JAVA Multiple Vulnerabilities in SAP Solution Manager 7.2 (User Experience Monitoring)
2989075 BOBJ Missing XML Validation in SAP BusinessObjects Business Intelligence Platform (Crystal Report)
© 2022
2020-12 SAP SE. All rights reserved. 449
System Recommendations – Recalculation for some notes
© 2022
2020-12 SAP SE. All rights reserved. 450
System Recommendations – Recalculation for some notes
BACKEND_SHNOTES_2020_12
CALC_*$*$2020_12
Maybe better:
CALC_*$JAVA$2020_12
CALC_*$HANADB$2020_12
CALC_*$BOBJ$2020_12
© 2022
2020-12 SAP SE. All rights reserved. 451
November 2020
Topics November 2020
Note 2952084 - Information Disclosure in SAP Process Integration (PGP Module – Business-to-
Business Add On)
Note 2963592 - Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver (Knowledge
Management)
Note 2971112 - Incorrect Default Permissions in SAP ERP Client for E-Bilanz 1.
Note 2890213 - Missing Authentication Check in SAP Solution Manager
Note 2985866 - Missing Authentication Check in SAP Solution Manager (JAVA stack)
Scenarios for Using the Security Audit Log
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2020-11 SAP SE. All rights reserved. 453
Note 2952084 - Information Disclosure in SAP Process Integration
(PGP Module – Business-to-Business Add On)
PGP Secure Store (New)
https://help.sap.com/saphelp_nw-secure-connect103/helpdata/en/da/33e33a47d14419bd51829f3ab53a94/frameset.htm
Use Configuration Store J2EE_COMP_SPLEVEL and search for element PIB2BPGP to show
systemes and installed versions of that component:
© 2022
2020-11 SAP SE. All rights reserved. 454
Note 2952084 - Information Disclosure in SAP Process Integration
(PGP Module – Business-to-Business Add On)
Update Keys
© 2022
2020-11 SAP SE. All rights reserved. 455
Note 2952084 - Information Disclosure in SAP Process Integration
(PGP Module – Business-to-Business Add On)
By default the modules PGPEncryption and PGPDecryption access the keys form this location:
usr/sap/<System ID>/<Instance ID>/sec
If you want to store the PGP keys in some other location, use module parameter keyRootPath
and specify the path.
If you do not want to store the PGP keys on a file system, use PGP Secure Store functionality
using module parameter useSecureStore=true
If you import a new PGP key to PGP Secure Store, it will be stored with encryption.
If some unencrypted keys exist, the new button Update Keys is enabled.
© 2022
2020-11 SAP SE. All rights reserved. 456
Note 2963592 - Cross-Site Scripting (XSS) vulnerability in SAP
NetWeaver (Knowledge Management)
Informational note:
Malicious resource execution in Knowledge ✓ Always Use Secure HTML Editor
Management cannot be achieved when using HTML ✓ Allow Only Basic Formatting
Editor with “Always Use Secure HTML Editor” and ❖ Allow Links
“Allow Only Basic Formatting” enabled. ❖ Activate Clipboard Buttons
These settings are enabled by default as of NetWeaver ❖ Allow Preview
version 7.11. ❖ Allow Indenting
❖ Allow Tables
Review the configuration in the Portal:
❖ Allow Bullets and Numbering
System Administration → System Configuration
→ Knowledge Management → Content Management ❖ Allow Images
→ Utilities → Editing → HTML Editing ❖ Allow Text Size and Font Setting
https://help.sap.com/viewer/96e4ea277c104112bc0237851eecb13e/7.5.19/en- ❖ Allow Color Settings
US/444cd511c6233f8ee10000000a1553f7.html
(The documentation still claims, that the settings are deactivated by default.)
Caution: The deactivation of editing
This is another topic compared with notes 2928635, 2957979 and
KBA 2932212 about "Force Text Download" functions can affect existing documents.
© 2022
2020-11 SAP SE. All rights reserved. 457
Note 2971112 - Incorrect Default Permissions in SAP ERP Client for
E-Bilanz 1.0
© 2022
2020-11 SAP SE. All rights reserved. 458
Note 2890213 - Missing Authentication Check in SAP Solution Manager
Note 2985866 - Missing Authentication Check in SAP Solution Manager
For this component you always install the latest patch of a specific Support Package.
© 2022
2020-11 SAP SE. All rights reserved. 460
Note 2890213 - Missing Authentication Check in SAP Solution Manager
Note 2985866 - Missing Authentication Check in SAP Solution Manager
Related notes:
[...]
Note 2898858 - LM-SERVICE 7.20 SP 10 Patch 2 → Solution for Webservice Security
Note 2908684 - LM-SERVICE 7.20 SP 10 Patch 4 → Solution for Missing authentication check
[...]
© 2022
2020-11 SAP SE. All rights reserved. 461
Scenarios for Using the Security Audit Log
© 2022
2020-11 SAP SE. All rights reserved. 462
Scenarios for Using the Security Audit Log
Recording Type
➢ Only Logging in the File System (Classic Approach) -
Local system audit approaches with a few events and few requirements for the
protection of personal data during the evaluation of logs
➢ Logging in the File System and Database with Alert Monitoring Alert Mode (Read and Delete)
Local system audit approaches, but adds the ability to display selected events in a
timely fashion as alerts in a central system
➢ Logging in the File System and Database as Temporary Buffer Temporary Buffer
Local system audit approaches, but adds the ability to for administrators to regularly
evaluate large datasets of log data. No archiving possible.
➢ Logging in the Database with External Evaluation and Storage Persistence in ext. System (API)
Global audit approach, where events are moved to a central system for evaluation
and long-term storage.
© 2022
2020-11 SAP SE. All rights reserved. 464
Scenarios for Using the Security Audit Log
Example: Logging in the File System and Database with Temporary Buffer
Local system audit approaches, but adds the ability to for administrators to regularly evaluate large datasets of log data
ABAP System
Ad hoc
analysis
User Events Database IT staff
triggers
events
SAP Secure By Default for S/4HANA on Premise 2020 Status - October 2020
Note 2971638 - Hard-coded Credentials in CA Introscope Enterprise Manager
Note 2969828 - OS Command Injection Vulnerability in CA Introscope Enterprise Manager
Note 2941667 - Code Injection Vulnerability in SAP NetWeaver (ABAP) (reloaded)
Note 887164 - BSP Test Applications in Production Systems
Note 2973497 - Multiple Vulnerabilities in SAP 3D Visual Enterprise Viewer
Note 2883638 - Information Disclosure in Supplier Relationship Management
Note 2973100 - Missing Authorization check in Manage Substitutions - Products and Manage
Exclusions - Product
Recordings:
Security Baseline Template 2.1 incl. Configuration Validation Package 2.1-CV-1 DSAG (German)
ASUG
Important Notes for System Recommendations and Configuration Validation SAP Learning HUB
© 2022
2020-10 SAP SE. All rights reserved. 467
SAP Secure By Default for S/4HANA on Premise 2020
Status - October 2020
Bjoern Brencher, S/4HANA Security
SAP Secure By Default for S/4HANA on Premise 2020
Motivation
• After installation of an S/4HANA on-premise system, customers need to invest significant time
and resources to apply various security settings and configurations.
• With this project, we aim to switch security settings directly after installation, system copies or
conversions to secure defaults.
• This will decrease the effort required by customers to apply security settings and further will
ensure that customer systems have a reasonable security status directly after installation.
© 2022
2020-10 SAP SE. All rights reserved. 469
SAP Secure By Default for S/4HANA on Premise 2020
Status
Products in Scope
S/4HANA on Premise 2020
Products based on S/4HANA Foundation, e.g.
– SAP Focused Run 3.0
– SAP Access Control
Customer Documentation
SAP Note 2926224 is a collection note including attachment
SAP Blog https://blogs.sap.com/2020/10/07/secure-by-default-for-s-4hana-2020/
Status
First shipment done with S/4HANA on Premise 1909
Additional security topics shipped with S/4HANA on Premise 2020
Further improvements planned with S/4HANA on Premise 2021
© 2022
2020-10 SAP SE. All rights reserved. 470
SAP Secure By Default for S/4HANA on Premise 2020
Technical View
Profile Parameters are set to secure values for S/4 HANA 2020
• 17 recommended values
• 27 parameters default values were changed in the SAP Kernel 7.81
© 2022
2020-10 SAP SE. All rights reserved. 471
SAP Secure By Default for S/4HANA on Premise 2020
How can I get the Improvements?
Conversions
SUM 2.0 SP09
Target: S/4HANA 2020
Upgrades
No automated changes
Comparison report can be used
© 2022
2020-10 SAP SE. All rights reserved. 472
SAP Secure By Default for S/4HANA on Premise 2020
Technical View – Recommended Value for Profile Parameter
© 2022
2020-10 SAP SE. All rights reserved. 473
SAP Secure By Default for S/4HANA on Premise 2020
Upgrade Scenarios
© 2022
2020-10 SAP SE. All rights reserved. 474
SAP Secure By Default for S/4HANA on Premise 2020
Is this enough Security?
© 2022
2020-10 SAP SE. All rights reserved. 475
SAP Secure By Default for S/4HANA on Premise 2020
Management Summary
Technical View
Secure By Default with S/4HANA on Premise covers Profile Parameters (extended with 2020), Switchable
Authorization Framework (SACF) (new with 2020), Security Audit Log (shipped with 1909)
Supported Scenarios
Settings are automatically applied as part of new installations, system copies and conversions
Tooling is provided to support customers in S/4HANA upgrade scenarios (as settings are not applied
directly)
Products in Scope
S/4HANA
Products running on S/4HANA Foundation (e.g. Focused Run)
Implement more Security
Use the SAP provided tools, like EWA, Configuration Validation, System Recommendation
© 2022
2020-10 SAP SE. All rights reserved. 476
Thank you
Contact information
Bjoern Brencher
S/4HANA Security
E-mail: [email protected]
Note 2971638 - Hard-coded Credentials in CA Introscope Enterprise
Manager
Affected Products:
Third Party add-on delivered as OEM for SAP Solution Manager and SAP Focused Run
https://support.sap.com/en/alm/solution-manager/expert-portal/introscope-enterprise-manager.html
The important part of the note is to change the default passwords of the users Admin and
Guest. Use SAP Solution Manager, configuration step 4 "Define CA Introscope" in “Infrastructure
Preparation” to set Introscope credentials. This updates the credentials on Introscope side as well as
in the SAP Solution Manager.
See Note 2310713 / KBA 2512694
© 2022
2020-10 SAP SE. All rights reserved. 479
Note 2969828 - OS Command Injection Vulnerability in CA
Introscope Enterprise Manager
Affected Products:
Third Party add-on delivered as OEM for SAP Solution Manager and SAP Focused Run
https://support.sap.com/en/alm/solution-manager/expert-portal/introscope-enterprise-manager.html
It might be the case that you run a quite old version even if you have updated the SAP Solution
Manager recently as it‘s not part of the SUM package. All old versions are assumed to be vulnerable.
On SAP Solution Manager 7.2, instead of installing a patch (if available for the installed version),
you could consider to install to latest version in any case:
© 2022
2020-10 SAP SE. All rights reserved. 480
Note 2969828 - OS Command Injection Vulnerability in CA
Introscope Enterprise Manager
How-to verify the installed version:
This gives you the exact patch number, e.g. 10.1.0.15 or 10.5.2.113 (vulnerable) or 10.7.0.304 (new)
© 2022
2020-10 SAP SE. All rights reserved. 481
Note 2969828 - OS Command Injection Vulnerability in CA
Introscope Enterprise Manager
How-to verify the installed version:
b) via the software component list of the Java part of the SAP Solution Manager
Caveat: This shows the version of the "agent", which might differ from the version of the "enterprise manager".
Notes:
Note 1757810 – How to get the complete list of software components on your NetWeaver Application Server Java
Note 1771843 – How to identify and search the latest patch level for a Netweaver Java Component [VIDEO]
Note 1752501 – Retrieving the Java version information offline
Note 2181113 – Getting the Versions of Deployed Units on AS Java from a Command Prompt
© 2022
2020-10 SAP SE. All rights reserved. 482
Note 2969828 - OS Command Injection Vulnerability in CA
Introscope Enterprise Manager
How-to verify the installed version :
© 2022
2020-10 SAP SE. All rights reserved. 483
Note 2969828 - OS Command Injection Vulnerability in CA
Introscope Enterprise Manager
Tipps:
© 2022
2020-10 SAP SE. All rights reserved. 484
Note 2941667 - Code Injection Vulnerability in SAP NetWeaver
(ABAP) (reloaded)
© 2022
2020-10 SAP SE. All rights reserved. 485
Note 887164 - BSP Test Applications in Production Systems
Deactivate test services according to note 887164: Deactivate test services of ABAP Channels (APC):
/sap/bc/bsp/sap/bsp_model /sap/bc/apc_test/*
/sap/bc/bsp/sap/htmlb_samples /sap/bc/webdynpro/sap/ABAP_ONLINE_COMMUNITY
/sap/bc/bsp/sap/it00 /sap/bc/apc/sap/abap_online_community
/sap/bc/bsp/sap/it01
/sap/bc/bsp/sap/it02 Deactivate more test services:
/sap/bc/bsp/sap/it03
/sap/bc/bsp/sap/it04 /sap/bc/echo/redirect
/sap/bc/bsp/sap/it05
/sap/bc/bsp/sap/itmvc2 /sap/bc/gui/sap/its/test/*
/sap/bc/bsp/sap/itsm
/sap/bc/bsp/sap/sbspext_htmlb /sap/bc/kw/skwr
/sap/bc/bsp/sap/sbspext_phtmlb
/sap/bc/bsp/sap/sbspext_table Note 2948239
/sap/bc/bsp/sap/sbspext_xhtmlb
/sap/bc/bsp/sap/system_private
/sap/bc/bsp/sap/system_public
© 2022
2020-10 SAP SE. All rights reserved. 486
Note 2973497 - Multiple Vulnerabilities in SAP 3D Visual Enterprise
Viewer
More issues solved about some file types (.cgm, .jt, .pdf, .rh)
Previous Note 2960815 - Improper Input Validation in SAP 3D Visual Enterprise Viewer
File types: .bmp , .cgm, .dib, .eps, .fbx, .gif, .hdr, .hpg, .hpgl, .plt, .pdf, .pcx, .rh, .rle, .tga
© 2022
2020-10 SAP SE. All rights reserved. 487
Note 2883638 - Information Disclosure in Supplier Relationship
Management
“Pre-requisite for this vulnerability is BYPASS_OUTB_HANDLER is not set to true in Standard Call
Structure configuration for the particular Catalog in SPRO.”
See:
Define External Web-Services - Parameters and values in the Call Structure
https://wiki.scn.sap.com/wiki/display/SRM/Define+External+Web-Services+-
+Parameters+and+values+in+the+Call+Structure
BYPASS_OUTB_HANDLER: The Outbound Handler service creates a link called "Back To SRM
Application" on the top of the catalog view. This parameter disables the service, usually for
performance reasons. Adding the Parameter value 'X' turns off the handler.
The SRM-MDM Catalog already has a "back" link rendered by the Search UI, so set this to avoid
duplicate links.
See more information and debugging hints about inbound and outbound handler here.
© 2022
2020-10 SAP SE. All rights reserved. 488
Note 2973100 - Missing Authorization check in Manage
Substitutions - Products and Manage Exclusions - Product
The existing authorization checks for authorization
objects M_MATE_WGR, M_MATE_MAT, and
M_MATE_MAR are rearranged in the code.
© 2022
2020-10 SAP SE. All rights reserved. 489
Security Baseline Template 2.1 incl. ConfVal Package 2.1-CV-1
© 2022
2020-10 SAP SE. All rights reserved. 490
Security Baseline Template 2.1 incl. ConfVal Package 2.1-CV-1
[Critical] Target System [Standard] Target System
1ACHANGE Protect Production System against changes 2AAUDIT Audit Settings
1ACRITA No use of critical auth. profile SAP_ALL 2ACHANGE Protect Production System against changes
1ACRITB No use of critical auth. profile/role SAP_NEW 2ACRITD Protection of Password Hashes
1ACRITC Critical Authorizations 2ADISCL Information Disclosure
1AMSGSRV Message Server Security 2AFILE Directory Traversal Protection
1APWDPOL Password Policy 2AMSGSRV Message Server Security
1ARFCGW RFC Gateway Security 2ANETCF Secure Network Configuration
1ASECUPD Regular Security Updates 2ANETENC Encryption of Network Connections
1ASTDUSR Standard Users 2AOBSCNT Obsolete Clients
1HAUDIT Audit Settings 2APWDPOL Password Policy
1HNETCF Secure Network Configuration 2ASSO Single Sign-On
1HPWDPOL Password Policy 2AUSRCTR User Control of Action
1HSECUPD Regular Security Updates 2HAUDIT Audit Settings
1HTRACES Critical Data in trace files 2HPWDPOL Password Policy
1JMSGSRV Message Server Security 2HSTDUSR Standard Users
1JNOTEST No Testing Functionality in Production 2JDISCL Information Disclosure
1JPWDPOL Password Policy 2JMSGSRV Message Server Security
1JSECUPD Regular Security Updates 2JSELFRG No Self-Registration of Users
1JRFCGW RFC Gateway Security 2JSESS Session Protection
© 2022
2020-10 SAP SE. All rights reserved. 491
Security Baseline Template 2.1 incl. ConfVal Package 2.1-CV-1
[Extended] Target System [Notes] Target System
3ACHANGE Protect Production System against changes N0510007 Note 510007 - Setting up SSL on AS ABAP
3AFILE Directory Traversal Protection N1322944 Note 1322944 - ABAP: HTTP security session
3ANETENC Encryption of Network Connections N2065596 Note 2065596 - Restricting logons to server
3APWDPOL Password Policy N2288631 Note 2288631 - CommonCryptoLib
3ARFCGW RFC Gateway Security N2449757 Note 2449757 - Add.auth.check in Trusted RFC
3ASCRIPT Scripting Protection N2562089 Note 2562089 - Directory Traversal vulnerability
3JAUDIT Audit Settings N2562127 Note 2562127 - Support Connection SNC / SSO
3JPWDPOL Password Policy N2671160 Note 2671160 - Missing input validation in CTS
3JSSO Single Sign-On N2934135 Note 2934135 - LM Configuration Wizard
3JRFCGW RFC Gateway Security
© 2022
2020-10 SAP SE. All rights reserved. 492
Important Notes for System Recommendations and Configuration
Validation
© 2022
2020-10 SAP SE. All rights reserved. 493
September 2020
Topics September 2020
Note 2961991 - Improper Access Control in SAP Marketing (Mobile Channel Servlet)
Note 2960815 - Improper Input Validation in SAP 3D Visual Enterprise Viewer
Note 2958563 - Code Injection vulnerability in SAP NetWeaver ABAP
Note 2951325 - Improper Authorization Checks in Banking services from SAP Bank Analyzer
and SAP S/4HANA Financial Products
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA (LM Configuration Wizard) –
reloaded (Configuration Validation)
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2020-09 SAP SE. All rights reserved. 495
Note 2961991 - Improper Access Control in SAP Marketing (Mobile
Channel Servlet)
The Mobile Channel Servlet is an integral part of SAP Hybris Marketing Cloud which you install
on SAP Cloud Platform.
Additional information:
Note 2963056 - FAQ - for SAP Note 2961991 - Improper Access Control in SAP Marketing
(Mobile Channel Servlet)
Workaround:
Note 2962970 - Disable the SAP Cloud Platform Servlet Used by the SAP Marketing Mobile SDK
© 2022
2020-09 SAP SE. All rights reserved. 496
Note 2961991 - Improper Access Control in SAP Marketing (Mobile
Channel Servlet)
© 2022
2020-09 SAP SE. All rights reserved. 497
Note 2961991 - Improper Access Control in SAP Marketing (Mobile
Channel Servlet)
© 2022
2020-09 SAP SE. All rights reserved. 498
Note 2961991 - Improper Access Control in SAP Marketing (Mobile
Channel Servlet)
The servlet is available on OneDrive. You find the installation and configuration guideline for a
specific release within the zip archive:
You can inspect the application URL to learn about the account ID and the app name:
https://mobilechannelab1234567.hana.ondemand.com/mobilechannel/sap/opu/odata/sap/API_MKT_LOCATION_SRV/
Caveat: There is no way to inspect or validate the version of the current installation.
© 2022
2020-09 SAP SE. All rights reserved. 499
Note 2960815 - Improper Input Validation in SAP 3D Visual
Enterprise Viewer
The solution is part of SAP 3D Visual Enterprise Author 9.0 FP09 MP2
References:
https://help.sap.com/ve
https://help.sap.com/viewer/68649624a1bd101496efce73094bb411/9.0.0.9/en-US/bedf68d83eae430f892ed29522bf6744.html
© 2022
2020-09 SAP SE. All rights reserved. 500
Note 2958563 - Code Injection vulnerability in SAP NetWeaver ABAP
© 2022
2020-09 SAP SE. All rights reserved. 501
Note 2951325 - Improper Authorization Checks in Banking services
from SAP Bank Analyzer and SAP S/4HANA Financial Products
Only relevant for software components FSAPPL 500 and S4FPSL 100
Manual instruction: It might be required to add allowed activity 01=create in both cases to be
able to maintain authorizations in PFCG.
SAP_FPS_CUSTOMIZER
SAP_FPS_EXP_FINANCIAL_ACCTNT
SAP_FPS_EXP_FINANCIAL_PLANNER
SAP_FPS_EXP_PLANNER
SAP_FPS_EXP_VDM_REPORTING
© 2022
2020-09 SAP SE. All rights reserved. 502
Note 2948239 - Cross-Site Scripting (XSS) vulnerability in SAP
NetWeaver AS ABAP (BSP Test Application)
Component: LMCTC
© 2022
2020-09 SAP SE. All rights reserved. 504
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard) - reloaded (Configuration Validation)
The Configuration Store J2EE_COMP_SPLEVEL has key fields COMPONENT and RELEASE (few filter
operators, no duplicates allowed) and data fields EXTRELEASE, PATCH_LEVEL, DESCRIPTION (many filter
operators available).
Solution: Use a regular expression which includes a ( Regex ) LMCTC(7.30 20)? ( = ) 7.30 ( = ) 20 ( >= ) 1 ( Ignore )
( Regex ) LMCTC(7.30 21)? ( = ) 7.30 ( >= ) 21 ( Ignore ) ( Ignore )
different but irrelevant part. ( Regex ) LMCTC(7.31 23)? ( = ) 7.31 ( = ) 23 ( >= ) 1 ( Ignore )
( Regex ) LMCTC(7.31 24)? ( = ) 7.31 ( = ) 24 ( >= ) 1 ( Ignore )
( Regex ) LMCTC(7.31 25)? ( = ) 7.31 ( = ) 25 ( >= ) 1 ( Ignore )
The regular expression ( Regex ) LMCTC(7.31 26)? ( = ) 7.31 ( = ) 26 ( >= ) 1 ( Ignore )
© 2022
2020-09 SAP SE. All rights reserved. 506
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard) - reloaded (Configuration Validation)
Result:
© 2022
2020-09 SAP SE. All rights reserved. 507
August 2020
Topics August 2020
KBA 2953257 - Check implementation of Note 2934135 based on data from SLD
Note 2754546 - Potential information disclosure in Lumira Designer
Note 2921615 - BI Platform stores SAP BW Authentication Password as clear text
Note 2941667 - Code Injection Vulnerability in SAP NetWeaver (ABAP) Recordings:
DSAG (German)
Note 2452425 - Collective Note - SAP SSO Certificate Lifecycle Management ASUG
SAP Learning HUB
© 2022
2020-08 SAP SE. All rights reserved. 509
Note 2835979 - Code Injection vulnerability in Service Data
Download (reloaded)
Did you have updated the corresponding Support Package of Software Component ST-PI?
(You can update software component ST-PI independently from any other maintenance activities.)
© 2022
2020-08 SAP SE. All rights reserved. 510
Note 2928635 - Cross-Site Scripting (XSS) in SAP NetWeaver (KM)
Note 2932212 - Security measures to protect KM
If you do not use Knowledge Management in the Portal, e.g. if you use the Portal only to
integrate user interfaces into a central server, you can deactivate WebDAV as well:
Parameter “Enable WebDAV Server” determines if support of the WebDAV protocol as specified in
RFC 2518 is enabled. If it is disabled, only http standard methods GET, HEAD, PUT, DELETE, and
OPTIONS calls are processed whereas the WebDAV specific methods to lock, release, create, copy,
move, or delete resources are blocked.
© 2022
2020-08 SAP SE. All rights reserved. 512
Note 2948106 - FAQ - for SAP Note 2934135 - LM Configuration
Wizard
11. How to verify if the vulnerability is mitigated after applying the patch or deactivating the application aliases?
Make an http call using method HEAD in command line or in REST clients to
http(s)://<host>:<port>/CTCWebService/CTCWebServiceBean
Tipps for using command line tool “curl” to submit the call:
• Use the option --head (respective the shortcut option -I which is an upper case "i") to trigger a HEAD request. This option
omits possible error conditions which you might get if you would use the http method GET or POST instead.
• You may add option --location (respective the shortcut option -L ) to follow automatically a redirect location provided by
the server together with http response code 307.
• You may add option --verbose (respective the shortcut option -v ) to make the operation more talkative.
Example:
curl --head --location http://<host>:<port>/CTCWebService/CTCWebServiceBean/
The response code should be:
✓ 401 “Unauthorized" or an authentication pop-up after applying the patch according to SAP Note 2934135
✓ 404 “Not Found" after deactivating the application aliases according to SAP Note 2939665
In a SAP Solution Manager system you can use the report provided by KBA 2953257 to run this verification for all Application
Server Java systems which are registered in the Software Lifecycle Directory (SLD).
© 2022
2020-08 SAP SE. All rights reserved. 513
KBA 2953257 - Check implementation of Note 2934135 based on
data from SLD
© 2022
2020-08 SAP SE. All rights reserved. 514
Note 2754546 - Potential information disclosure in Lumira Designer
New feature in Lumira 2.3 from march 2019 with manual settings
Administrator Guide - General Security Recommendations
https://help.sap.com/viewer/b2ab3c5d05314085985c4b78aa17db2d/2.4.0.0/en-US/3ba5253372bc1014ae0faa81b0e91070.html
„You can now prevent the use of unsupported security-relevant Java VM arguments in SAP Lumira
Designer centrally on every user's machine by adding a setting to a branch in the Windows registry to
which the users don't have write access.”
[HKEY_LOCAL_MACHINE\SOFTWARE\JavaSoft\Prefs\com\sap\lumira\designer]
"disable_insecure_vm_args"="true“
Connection data for an authentication plugin was stored including user with password in clear
text.
Business Intelligence Platform Administrator Guide – How to add an SAP entitlement system
https://help.sap.com/viewer/DRAFT/2e167338c1b24da9b2a94e68efd79c42/4.3.1/en-US/468134a16e041014910aba7db0e91070.html
© 2022
2020-08 SAP SE. All rights reserved. 516
Note 2941667 - Code Injection Vulnerability in SAP NetWeaver
(ABAP) and ABAP Platform
Transaction SHDB
The batch input recorder report RSBDCREC is changed from local implementation to central API.
Beside various repository checks, the API function RPY_PROGRAM_INSERT requires that user
has authorization S_DEVELOP.
➢ You cannot use this report (or this operation) in production systems anymore
© 2022
2020-08 SAP SE. All rights reserved. 517
Note 2452425 - Collective Note - SAP SSO Certificate Lifecycle
Management for ABAP
Alerts only,
no renewal
© 2022
2020-08 SAP SE. All rights reserved. 518
Note 2452425 - Collective Note - SAP SSO Certificate Lifecycle
Management for ABAP
The configuration of the SLS, ABAP systems and Java Systems is described here:
© 2022
2020-08 SAP SE. All rights reserved. 519
July 2020
Topics July 2020
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA (LM Configuration Wizard)
Note 2774489 - Code Injection vulnerability in ABAP Tests Modules of SAP NetWeaver Process
Integration
Note 2932473 - Information Disclosure in SAP NetWeaver (XMLToolkit for Java)
Note 2923117 - How to address problems with old TLS protocol versions in clients accessing
SAP Cloud Platform NEO (reloaded)
Note 2923799 - Final Shutdown of RFC Connections From Customer Systems to SAP
Note 2928592 - Download digitally signed Notes using HTTP in SAP_BASIS 700 to 731
Note 2934203 - ST-A/PI 01T* SP01 - 01U SP00: SAP backbone connectivity for RTCCTOOL
KBA 2911301 / Note 2946444 - SAP Support Portal - Renew client certificate
Recordings:
Recommended Notes for System Recommendations DSAG (German)
ASUG
SAP Learning HUB
© 2022
2020-07 SAP SE. All rights reserved. 521
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
All Java systems on all releases as of 7.30 are affected - standalone Java as well as the Java
part of dual stack systems.
Be aware that such Java systems often serve as internet facing User Interface systems.
This Java application is used by few SAP Lifecycle procedures only, such as the initial
technical setup, and it is not needed in day-to-day operations.
Related notes:
KBA 2948106 - FAQ - for SAP Note 2934135
Note 2939665 - Disable LM Configuration Wizard
Note 1589525 (describing firewall URL filter rules)
Note 1451753 (describing filtering of administration requests)
© 2022
2020-07 SAP SE. All rights reserved. 522
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
At once: Deactivate on all application servers the aliases CTCWebService ctc/core
ctcprotocol respective application tc~lm~ctc~cul~startup_app
and validate that service CTCWebService is offline as described in KBA 2939665
In addition: Implement firewall rules for URL blocking as described in note 1589525
or develop filter rules for administrative requests according to note 451753
Short time: Implement the patch for Software Component LMCTC as described in the note.
The patch does not depend on any other component and you can it deploy online (without
downtime or restart) using telnet (see KBA 1715441) or if possible SUM (see Blog and Note 1641062).
Software Download Example:
https://launchpad.support.sap.com/#/softwarecenter/search/LM%2520CONFIGURATION%2520WIZARD%25207.50
Scheduled: This month you find multiple notes about Java, therefore, schedule a combined
update of all Java components. You can take the time for preparation, if you have deactivated
the vulnerability described by this note.
© 2022
2020-07 SAP SE. All rights reserved. 523
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
© 2022
2020-07 SAP SE. All rights reserved. 524
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
© 2022
2020-07 SAP SE. All rights reserved. 525
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
7.10 not affected
View current status (continued): 7.11 not affected
7.20 not affected
© 2022
2020-07 SAP SE. All rights reserved. 527
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
Disable Service:
Call the NetWeaver Administrator at http(s)://<host>:<port>/nwa and login with admin user
→ Configuration
→ Infrastructure
→ JAVA HTTP Provider Configuration
→ Application Aliases
CTCWebService
ctc/core
ctcprotocol
© 2022
2020-07 SAP SE. All rights reserved. 528
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
Verify deactivation:
Invalid Response Code: (404) Not Found
Call the Web Service Navigator at
http(s)://<host>:<port>/wsnavigator
and login with admin user
Choose Search Type „Provider System“
and search for CTCWebService
© 2022
2020-07 SAP SE. All rights reserved. 529
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
Verify deactivation:
Call the services using a HEAD request and check the http return code: vulnerable ok
http(s)://<host>:<port>/CTCWebService/CTCWebServiceBean 200 / 405 404 / 401
http(s)://<host>:<port>/CTCWebService/CTCWebServiceBean?wsdl 200+xml 404 / 401
()
© 2022
2020-07 SAP SE. All rights reserved. 530
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
Disable application:
Call the NetWeaver Administrator at http(s)://<host>:<port>/nwa and login with admin user
→ Operations
→ Start and Stop (you can cancel any additional logon popup for OS credentials)
→ JAVA Applications
→ More Actions
→ Edit Startup Filters
© 2022
2020-07 SAP SE. All rights reserved. 531
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
Disable application (continued):
→ Filters
→ Add
© 2022
2020-07 SAP SE. All rights reserved. 532
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
Disable application (continued):
Enter Filter:
Action: disable
Vendor mask: sap.com
Component: application
Component Name mask: tc~lm~ctc~cul~startup_app
© 2022
2020-07 SAP SE. All rights reserved. 533
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
Verify deactivation:
Call the Web Service Navigator at
http(s)://<host>:<port>/wsnavigator
and login with admin user
Choose Search Type „Provider System“
and search for CTCWebService
© 2022
2020-07 SAP SE. All rights reserved. 534
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
https://<host>:<port>/sap/bc/ui2/flp?sap-client=<client>&sap-language=EN#Action-UISMMySAPNotes&/NoteOverview/sapnote=2934135
© 2022
2020-07 SAP SE. All rights reserved. 535
Note 2934135 - Multiple Vulnerabilities in SAP NetWeaver AS JAVA
(LM Configuration Wizard)
Cross system verification of installed patches
Component: LMCTC
© 2022
2020-07 SAP SE. All rights reserved. 536
Note 2774489 - Code Injection vulnerability in ABAP Tests Modules
of SAP NetWeaver Process Integration
Now you can find an exploit on the internet: Search for CVE-2019-0328
© 2022
2020-07 SAP SE. All rights reserved. 537
Note 2932473 - Information Disclosure in SAP NetWeaver
(XMLToolkit for Java)
https://support.sap.com/securitynotes
→
Report a Vulnerability
→
a) Normal incident
b) Web form
c) Email to [email protected]
Get the public PGP key
SAP creates and process a special “Security incident” (restricted access and supervision)
© 2022
2020-07 SAP SE. All rights reserved. 538
Note 2923117 - How to address problems with old TLS protocol
versions in clients accessing SAP Cloud Platform NEO
TLS 1.0 / 1.1 Traffic Analysis
As an admin of an SAP Cloud Platform Neo (sub-)account, you can directly access the logs of the traffic reaching
your account using the following applications. It will show you the TLS 1.0 / 1.1 traffic reaching your account for a
selected time range.
https://tlsusagea621a4188.hana.ondemand.com/
The authentication for the self-service application is using the SAP ID Service, the usual user ID and credentials
as used for the SAP Cloud Platform Cockpit and other admin tools.
© 2022
2020-07 SAP SE. All rights reserved. 539
Note 2923117 - How to address problems with old TLS protocol
versions in clients accessing SAP Cloud Platform NEO
TLS 1.0 / 1.1 Traffic Analysis
LOG_SOURCE = ‘CPI’ → Cloud Platform Integration in general
USER_AGENT = ‘SAP NetWeaver Application Server%’ → NetWeaver Application Server
USER_AGENT = ‘SAP Web Application Server%’ → ABAP Application Server
Sum(“REQUESTS”) < DAYS → Suspected false-positive
Sum(“REQUESTS”) without USER_AGENT > DAYS → Non-Browser Client
USER_AGENT that is no Web Browser → Non-Browser Client
Old Browser/Device → Update Browser or Device
Recent Browser/Device → Check Network Devices
Many different Browser/Devices → External User-Facing Website
© 2022
2020-07 SAP SE. All rights reserved. 540
Note 2923117 - How to address problems with old TLS protocol
versions in clients accessing SAP Cloud Platform NEO
ABAP systems up to and including ABAP 752 (=S4/HANA 1709) require explicit opt-in configuration to
enable TLSv1.2-Support for outgoing TLS-protected communication, see the list of recommended profile
parameters in section 7 of Note 510007:
DIR_EXECUTABLE $(DIR_INSTANCE)$(DIR_SEP)exe
DIR_LIBRARY $(DIR_EXECUTABLE)
SAPCRYPTOLIB $(DIR_LIBRARY)$(DIR_SEP)libsapcrypto.so
sec/libsapsecu $(SAPCRYPTOLIB)
ssf/ssfapi_lib $(SAPCRYPTOLIB)
ssl/ssl_lib $(SAPCRYPTOLIB)
ssl/ciphersuites 135:PFS:HIGH::EC_P256:EC_HIGH
ssl/client_ciphersuites 150:PFS:HIGH::EC_P256:EC_HIGH
icm/HTTPS/client_sni_enabled TRUE
ssl/client_sni_enabled TRUE
Please ensure that you are not loading an old Cryptolib from a location other than $(DIR_EXECUTABLE)
with custom values for profile parameters ssl/ssl_lib, ssf/ssfapi_lib, sec/libsapsecu. see also
section 2 of SAP Note 510007.
© 2022
2020-07 SAP SE. All rights reserved. 541
Note 2923117 - How to address problems with old TLS protocol
versions in clients accessing SAP Cloud Platform NEO
ABAP systems require a minimum version of CommonCryptoLib 8 which implements TLSv1.2. If your
version of CommonCryptoLib is older than version 8.4.48, then you should upgrade your library.
See also SAP Note 1848999.
You can use transaction STRUST → "Environment" → "Display SSF Version" to display the version of your
CryptoLib. If you are still on ABAP 7.0x or 7.1x, then you need at minimum Kernel 720 patch 88.
© 2022
2020-07 SAP SE. All rights reserved. 542
Note 2923799 - Final Shutdown of RFC Connections From Customer Systems to SAP
On Monday November 30, 2020 all RFC communications from customer systems to SAP will
cease permanently and irreversibly. Applications which still might use RFC:
o Notes Download
o EWA
o RTCCTOOL
o SAP Solution Manager functions
© 2022
2020-07 SAP SE. All rights reserved. 543
Note 2928592 - Download digitally signed Notes using HTTP in SAP_BASIS 700 to 731
The note downports for SAP_BASIS 700 to 731 the option to download digitally signed Notes
using HTTP procedure (in addition to existing method to use a central Download Service
system).
You find a new version of the pdf document about “Enabling and Using SNOTE for Digitally
Signed SAP Notes”, too.
Related notes:
Note 2934203 - ST-A/PI 01T* SP01 - 01U SP00: SAP backbone connectivity for RTCCTOOL
Note 2837310 - Connecting Legacy Systems with https to SAP Support Backbone
© 2022
2020-07 SAP SE. All rights reserved. 544
KBA 2911301 / Note 2946444 - SAP Support Portal connection -
Renew client certificate
Note 2950184 - SyRec: JAVA Note is missing due to too low support package level
(if this note is required, request access to pilot release)
Note 2933596 - SysRec:7.2: Note for SAP HANA Database is not presented
Note 2930024 - SysRec: validity of note does not match system status
Note 2913837 - SYSREC: System recommendation reports the already implemented notes
Note 2747922 - SysRec: Collective Corrections for Solution Manager 720 SP08 Fiori UI
Note 2854704 - SysRec: Collective Corrections for Solution Manager 720 SP09 Fiori UI
Note 2857899 - SysRec: Collective Corrections for Solution Manager 720 SP10 Fiori UI
© 2022
2020-07 SAP SE. All rights reserved. 546
June 2020
Topics June 2020
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2020-06 SAP SE. All rights reserved. 548
Note 2761608 - RFC Callback rejected: Analysis
In addition to the Security Audit Log messages DUI, DUJ, DUK you can inspect the workprocess
trace in transaction SM50 to analyze missing RFC callback entries:
Limitation: Currently this option is only valid for SAP_BASIS 7.40 SP 6-21 (via this note)
© 2022
2020-06 SAP SE. All rights reserved. 549
Note 2912939 - Server Side Request Forgery vulnerability in SAP
NetWeaver AS ABAP
© 2022
2020-06 SAP SE. All rights reserved. 550
Note 2918924 - Use of Hard-coded Credentials in SAP Commerce
and SAP Commerce Datahub
© 2022
2020-06 SAP SE. All rights reserved. 551
Note 2933282 - Missing Authorization Check in SAP SuccessFactors
Recruiting
© 2022
2020-06 SAP SE. All rights reserved. 552
Note 2541823 - Switchable authorization checks for RFC in SAP
CRM (external billing)
SACF Note:
➢ Implementation via SNOTE or via SP update does not improve security because it produces
inactive software
➢ Analyze if (technical) users would require new authorizations and adjust roles if neccessary
➢ Use transaction SACF to create the productive SACF scenario and to activate the
corresponding authorization check
Caveat: If you plan to implement the note via SNOTE you have to follow the manual instruction,
to upload the scenario definition via the attachment of the note.
© 2022
2020-06 SAP SE. All rights reserved. 554
Note 2878935 - Cross-Site Scripting (XSS) vulnerability in SAP
NetWeaver AS ABAP (BSP Test Application SBSPEXT_TABLE)
HTMLB_samples
SBSPEXT_HTMLB
sbspext_table
© 2022
2020-06 SAP SE. All rights reserved. 555
Note 2423576 - SAIS | Generic audit report about system changes
Availability
Transaction / Report
SAIS_MONI is available
via Support Package:
SAP_BASIS
© 2022
2020-06 SAP SE. All rights reserved. 556
Note 2423576 - SAIS | Generic audit report about system changes
Selection Screen
© 2022
2020-06 SAP SE. All rights reserved. 558
Note 2423576 - SAIS | Generic audit report about system changes
Data Sources
© 2022
2020-06 SAP SE. All rights reserved. 559
Note 2423576 - SAIS | Generic audit report about system changes
Example
© 2022
2020-06 SAP SE. All rights reserved. 560
Note 2423576 - SAIS | Generic audit report about system changes
Implementation via SNOTE
SNOTE creates several new objects and fails if
you try it in one step:
According to the manual correction instruction
you should implement, activate and execute
report NOTE_2423576 first.
https://launchpad.support.sap.com/#/notes/0002423576/D
© 2022
2020-06 SAP SE. All rights reserved. 561
Note 2423576 - SAIS | Generic audit report about system changes
Implementation via SNOTE
If you missed that, activate and execute this report NOTE_2423576 in SE38:
© 2022
2020-06 SAP SE. All rights reserved. 562
Note 2423576 - SAIS | Generic audit report about system changes
Implementation via SNOTE
Run report NOTE_2423576 again!
© 2022
2020-06 SAP SE. All rights reserved. 563
May 2020
Topics May 2020
Note 2923117 - How to address problems with old TLS protocol versions in clients accessing
SAP Cloud Platform NEO
Note 2917090 - Information Disclosure in SAP Adaptive Server Enterprise (Cockpit)
Note 2917275 - Code injection in SAP Adaptive Server Enterprise (Backup Server)
Note 2835979 - Code Injection vulnerability in Service Data Download
Note 2885244 - Missing Authentication check in SAP Business Objects Business Intelligence
Platform (Live Data Connect)
Note 2734580 - Information Disclosure in SAP ABAP Server
Note 2911801 - Binary planting vulnerability in SAP Business Client
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2020-05 SAP SE. All rights reserved. 565
Note 2923117 - How to address problems with old TLS protocol
versions in clients accessing SAP Cloud Platform NEO
As of now (May 2020), SAP Cloud Platform NEO is still supporting TLS version 1.0 and 1.1 in
addition to 1.2 in many regions. The support of TLS 1.0 and 1.1 will be completely stopped by
end of June 2020. After that time, HTTPS clients not capable of using TLS 1.2 or higher will fail
to connect to SAP Cloud Platform NEO.
➢ Browser as a Client
• If a user is using a browser to connect to an application, this browser needs to be in a version supporting
TLS 1.2 or higher – all recent versions of the major browsers support this.
© 2022
2020-05 SAP SE. All rights reserved. 566
Note 2923117 - How to address problems with old TLS protocol
versions in clients accessing SAP Cloud Platform NEO
➢ SAP NetWeaver Process Integration as Client contacting SAP Cloud Platform
• TLSv1.2 support in REST adapter: Note 2295870
• TLSv1.2 support in Axis adapter: Note 2292139
➢ Technical contact
• In case of technical problems or question, raise a Service Ticket with “TLS Migration” in header.
© 2022
2020-05 SAP SE. All rights reserved. 567
Note 2917090 - Information Disclosure in SAP Adaptive Server Enterprise (Cockpit)
Note 2917275 - Code injection in SAP Adaptive Server Enterprise (Backup Server)
Various notes about SAP ASE with different priorities, affected releases and solutions
Note 2915585 - Missing validation in SAP Adaptive Server Enterprise (XP Server on Windows) ☑ ☑ ☑ ☑
Note 2916927 - SQL Injection vulnerability in SAP Adaptive Server Enterprise n.a. n.a. ☑ ☑
Note 2917022 - Information Disclosure in SAP Adaptive Server Enterprise n.a. n.a. n.a. ☑
Note 2917090 - Information Disclosure in SAP Adaptive Server Enterprise (Cockpit) n.a. n.a. ☑ ☑
Note 2917273 - SQL Injection vulnerability in SAP Adaptive Server Enterprise (Web Services) ☑ ☑ ☑ ☑
Note 2917275 - Code injection in SAP Adaptive Server Enterprise (Backup Server) n.a. n.a. n.a. ☑
Note 2920548 - Missing authorization check in SAP Adaptive Server Enterprise ☑ ☑ ☑ ☑
© 2022
2020-05 SAP SE. All rights reserved. 568
Note 2917090 - Information Disclosure in SAP Adaptive Server Enterprise (Cockpit)
Note 2917275 - Code injection in SAP Adaptive Server Enterprise (Backup Server)
Note 2917090
➢ Increased criticality:
It’s not about the access to the ASE Cockpit and no ASE database user is related. It’s a
general issue.
➢ Mitigation:
Impacts only Windows platform
Note 2917275
➢ Mitigation:
A potential attacker requires to be the Database Owner (dbo) or a user with dump/load
database privilege.
© 2022
2020-05 SAP SE. All rights reserved. 569
Note 2835979 - Code Injection vulnerability in Service Data
Download
HotNews
Solution:
“Implement the note. The implementation of the note has no impact to any productive business
process.”
… but you have to do it in all ABAP systems because the ST-PI plugin is installed in all ABAP
systems which are connected to a SAP Solution Manager
© 2022
2020-05 SAP SE. All rights reserved. 570
Note 2885244 - Missing Authentication check in SAP Business
Objects Business Intelligence Platform (Live Data Connect)
If you are using SAP BOE Live Data Connect 1.0., 2.0., 2.X., 2.1., 2.2., or 2.3., you need to
upgrade to the latest available version 2.4, which you can get from SAP Software Downloads
2. Retrieve the “shared secret” from the Central Management Console of your BIP system.
Activating trusted authentication in SAP BusinessObjects BI Platform
https://help.sap.com/viewer/6be6d1fc887046f7a5e5c1aa52505e86/latest/en-US/c2fba9beb34f4aabaef6b34f222969bc.html
3. Use the “shared secret” to set lde.boe.sharedKey in the Live Data Connect property file
Configuring SAP BusinessObjects Live Data Connect
https://help.sap.com/viewer/6be6d1fc887046f7a5e5c1aa52505e86/latest/en-US/14b7943431bb4fb08b73b6ef4f43ab88.html
© 2022
2020-05 SAP SE. All rights reserved. 571
Note 2734580 - Information Disclosure in SAP ABAP Server
© 2022
2020-05 SAP SE. All rights reserved. 572
Note 2734580 - Information Disclosure in SAP ABAP Server
Available Modes:
1. Logging
Activate this now to get data!
2. Simulated Check
As soon as you have entered
some entries, still insecure!
3. Active Check
Secure mode
4. Monitoring: Check log
Context types:
1 Trusted Network Zone (former entry types 02, 03, 10, 11, 20, 21, 40 and 99)
2 ClickJacking Framing Protection (former entry type 30)
3 CSS Style Sheet (former entry type 01)
4 Cross-origin Resource Sharing (entry type 50 only available with UCON HTTP allowlist, see Note 2547381)
© 2022
2020-05 SAP SE. All rights reserved. 573
Note 2734580 - Information Disclosure in SAP ABAP Server
If the UCON HTTP allowlist is not available in the system (see Note 2573569) or it is not activated yet,
the content of table HTTP_WHITELIST is used. If at least one record exists for an entry type, the
check is active for that entry type. Entry type 30 (Clickjacking Framing Protection) is always active.
01 Portal CSS Theme-URL / HTTP Framework to filter for valid URLs (Note 853878)
02 Exit URL for parameter sap-exiturl
03 NWBC runtime
10 WebDynpro Resume URL (Note 2081029)
11 Web Dynpro Redirect URL (Note 2081029)
20 Redirect URL for SSO, parameter sap-mysapred of ICF (Note 612670)
21 Redirect URL for ICF Logoff, parameter redirectURL of ICF (Note 1509851)
30 Clickjacking Framing Protection (Note 2142551)
40 Suite Redirect
99 Redirect (generic)
© 2022
2020-05 SAP SE. All rights reserved. 574
Note 2734580 - Information Disclosure in SAP ABAP Server
Option b) In client 000 maintain table HTTP_WHITELIST with entry type 21 to enable HTTP
allowlist Protection
Transaction SE16 for table HTTP_WHITELIST Report RS_HTTP_WHITELIST shows the value help
for the entry type field, too:
(Caution: Ensure to go back to initial screen to copy the entries
into table HTTP_WHITELIST)
© 2022
2020-05 SAP SE. All rights reserved. 575
Note 2911801 - Binary planting vulnerability in SAP Business Client
Client-side configuration and installation of SAP Business Client for Desktop 7.0 together with
SAP GUI for Windows 7.60
1. Download SAP Business Client from SAP Software Download Center
NWBC700_10-70003080.EXE
2. Create and distribute system connections (Fiori Launchpad connection, NWBC connection,
SAP logon connection, and SAP shortcut) and client configuration
3. Create and distribute Security Settings for Browser Controls
See:
Note 2714160 - SAP Business Client 7.0: Prerequisites and restrictions
Note 2622660 - Security updates for the browser control Google
Chromium delivered with SAP Business Client
https://community.sap.com/topics/business-client → Install and Configure
© 2022
2020-05 SAP SE. All rights reserved. 577
Note 2911801 - Binary planting vulnerability in SAP Business Client
Implement note 2920217 to enhance System Recommendations to show SAP Business Client
Notes
It simply would show Business Client notes (BC-WD-CLT-BUS) for all ABAP systems.
That‘s similar like with SAPGUI notes (BC-FES-GUI).
© 2022
2020-05 SAP SE. All rights reserved. 578
April 2020
Topics April 2020
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2020-04 SAP SE. All rights reserved. 580
Security Notes Statistics
Q: Do you know if there is any general security finding, that is causing this multiple security
patch fixing?
A: SAP got reports about multiple critical security vulnerabilities in the SAP Host Agent and the
SAP Diagnostics Agents and other parts of the SAP Solution Manager which had been fixed
step by step during the past month. Therefore we see notes for these components again and
again.
You could download the list of Security Notes from https://support.sap.com/notes with filter for
“Document Type = SAP Security Notes” to produce a statistics about publication month, however, it
might be a little bit misleading as updated notes only show up when they are published the last time
but not when they have been published initially. Therefore you would see less notes for previous
month than expected.
The Security Notes Advisory on https://support.sap.com/sos shows snapshots from each month. Using
this data we can construct a chart showing updated notes in every month when such a note was
published.
© 2022
2020-04 SAP SE. All rights reserved. 581
Security Notes Statistics
© 2022
2020-04 SAP SE. All rights reserved. 582
SOS Checks ABAP / HANA / Java
See
Note 1969700 - SQL Statement Collection for SAP HANA
Note 1999993 - How-To: Interpreting SAP HANA Mini Check Results
© 2022
2020-04 SAP SE. All rights reserved. 583
Note 2896682 - Directory Traversal vulnerability in SAP NetWeaver
(Knowledge Management)
→The whole server is at risk, therefore CVSS shows “Scope = Changed” which is the main
driver for a high score and high priority.
CVSS Score: 9.1
Attack Vector (AV): Network (N)
Attack Complexity (AC): Low (L)
Privileges Required (PR): Low (L)
User Interaction (UI): None (N)
Scope (S): Changed (C)
Confidentiality Impact (C): High (H)
Integrity Impact (I): Low (L)
Availability Impact (A): Low (L)
Mitigation: The issue is about uploading files into the Portal which require authorizations for
Portal Content administration. Therefore you should verify which users are assigned to role
pcd:portal_content/administrator/content_admin/content_admin_role
© 2022
2020-04 SAP SE. All rights reserved. 584
Note 2863731 - Deserialization of Untrusted Data in SAP Business
Objects Business Intelligence Platform (CrystalReports Viewer)
“Do you need to update all clients (with CRYSTAL REPORTS FOR VS 2010) as well as the
server (with SBOP BI PLATFORM SERVERS)?
What happens if you only update either the clients or the server?”
➢ If customer applied the patches linked in the SAP note, it will be implemented completely.
© 2022
2020-04 SAP SE. All rights reserved. 585
Note 2900118 - Code Injection vulnerability in SAP OrientDB 3.0
See
Note 2895241 - OrientDB: Information needed by Product/Development Support
© 2022
2020-04 SAP SE. All rights reserved. 586
March 2020
Topics March 2020
© 2022
2020-03 SAP SE. All rights reserved. 588
Note 2890213 - Missing Authentication Check in SAP Solution
Manager (User-Experience Monitoring)
User-Experience Monitoring
https://support.sap.com/en/alm/solution-manager/expert-portal/user-experience-monitoring.html
https://wiki.scn.sap.com/wiki/display/EEM/Home
© 2022
2020-03 SAP SE. All rights reserved. 589
Note 2890213 - Missing Authentication Check in SAP Solution
Manager (User-Experience Monitoring)
Critical, because EemAdmin is powerful:
© 2022
2020-03 SAP SE. All rights reserved. 590
Note 2890213 - Missing Authentication Check in SAP Solution
Manager (User-Experience Monitoring)
Workaround: Manual activation of
EemAdmin authentication as a partial fix.
© 2022
2020-03 SAP SE. All rights reserved. 591
Note 2892570 - Missing XML Validation vulnerability in ABAP
Development Tools
The code execution occurs on the computer where the ABAP Development Tools are installed
and is done with the privileges of the logged on (frontend) user.
The easiest way to get the ABAP Development Tools is to use SAPs update sites described/linked
on https://tools.hana.ondemand.com/#abap.
They host the latest available version of the tools.
Alternatively you can download from the SAP Software Download Center as described in the note.
© 2022
2020-03 SAP SE. All rights reserved. 592
Note 2892570 - Missing XML Validation vulnerability in ABAP
Development Tools
Ensure to distribute the package via Eclipse within your organization and that developers configure
their installation to get it automatically:
Solution: Implement the patch for SBOP BI PLATFORM SERVERS 4.2 as described in the note
The reference to the deployment guide and to KBA 2824635 show how to configure
MobileBIService in general. This is not related to the vulnerability.
© 2022
2020-03 SAP SE. All rights reserved. 594
Note 2871167 - Missing Authorization check in SAP ERP and S/4
HANA (MENA Certificate Management)
The note is about assigning table authorization group FC01 to view FIMENAV_COMPCERT as
described in the manual instruction. The automatic instruction for SNOTE does not change
anything.
Anyway, if you run a sound authorization concept about S_TABU_NAM but to not use
S_TABU_DIS at all, then this note is not important.
→ Go for utilizing S_TABU_NAM instead S_TABU_DIS
© 2022
2020-03 SAP SE. All rights reserved. 595
Note 2859004 - Cross-Site Request Forgery in SAP Cloud Platform
Integration for data services
© 2022
2020-03 SAP SE. All rights reserved. 596
Note 2808169 - SAL | Archiving with BC_SAL / API for alert cockpits
The general idea is to read and delete log entries within one step.
Prerequisite: recording target "Record in Database“ in Alert Mode and archive connection
Required authorizations:
S_SAL with SAL_ACTVT = SHOW_ALERT
© 2022
2020-03 SAP SE. All rights reserved. 597
Note 2730525 - ANST: Consuming the Note Search Webservice
Note 2818143 - ANST: Implementing SOAP Based Note Search
© 2022
2020-03 SAP SE. All rights reserved. 598
February 2020
Topics February 2020
© 2022
2020-02 SAP SE. All rights reserved. 600
Focus Insights: Go for it!
References:
➢ Focused Insight
https://support.sap.com/en/alm/focused-solutions/focused-insights.html
➢ Installation Guide
https://help.sap.com/doc/2a5eebe6285b465eb7fb4a6e66b8ea2b/230/en-US/FINSIGHTS_InstallationGuide.pdf
© 2022
2020-02 SAP SE. All rights reserved. 601
Focus Insights: Go for it!
© 2022
2020-02 SAP SE. All rights reserved. 602
SAP Release and Maintenance Strategy (SAP HANA)
© 2022
2020-02 SAP SE. All rights reserved. 603
Secure Operations Map
© 2022
2020-02 SAP SE. All rights reserved. 604
Security Baseline Template 2.0
© 2022
2020-02 SAP SE. All rights reserved. 605
Note 2887651 - Issues with SameSite cookie handling
Chrome default settings
As of February, 2020, Google Chrome version 80 and higher implements the SameSite=Lax default.
https://www.chromestatus.com/feature/5088147346030592
chrome://version/
chrome://flags/#same-site-by-default-cookies
https://www.chromium.org/updates/same-site/test-debug
© 2022
2020-02 SAP SE. All rights reserved. 606
Note 2887651 - Issues with SameSite cookie handling
Affected scenarios
Affected scenarios:
Currently, the following products based on the SAP Kernel do not set the SameSite=None attribute:
• SAP Application Server ABAP
• SAP Application Server Java, incl. SAP Enterprise Portal and SAML Identity Provider based on AS Java
• SAP HANA XS Classic
• SAP HANA XS Advanced
All scenarios that integrate these products with web services from different registrable domains
within a single browser window are potentially affected.
Examples are scenarios that integrate with SAP Analytics Cloud, Enterprise Portals, SAP CoPilot,
SAP Enable Now Web Assistant or that use Logon using a SAML IdP.
Pure intranet scenarios within a corporate DNS domain (e.g. *.acme.corp) are not affected.
Solution: Ensure to use HTTPS protocol and implement modification rule set on Web Dispatcher.
© 2022
2020-02 SAP SE. All rights reserved. 607
Note 2887651 - Issues with SameSite cookie handling
How to verify potential issues: F12 Show Developer Console
© 2022
2020-02 SAP SE. All rights reserved. 608
Note 2822074 - Missing Authorization check for remote access BOR
© 2022
2020-02 SAP SE. All rights reserved. 612
Note 2836445 - Unprivileged Access to technical data using SAPOSCOL
© 2022
2020-02 SAP SE. All rights reserved. 613
Note 2841053 - Denial of Service (DOS) Vulnerability in SAP Host Agent
Restrict access to the ports 1128 and 1129 to the datacenter network – but SUM requires it …
see next slide for potential issues
If you need to expose the SAP Host Agent to untrusted networks, you can disable default
username/password-based authentication and only allow certificate-based authentication.
Blog: How to configure X.509 client certificate authentication for SAP host agents in LVM
© 2022
2020-02 SAP SE. All rights reserved. 614
Note 2841053 - Denial of Service (DOS) Vulnerability in SAP Host Agent
The Software Update Manager (SUM) uses ports 1128 (http) respective 1129 (https), too:
Note 2284028 - SUM SL Common UI : Troubleshooting problems with the new SUM UI
Note 1826767 - 'Could not check credentials...Connection refused' when upgrading HANA using SUM
Other notes:
Note 2669791 / 2689366 - SAP host agent connectivity with certificate based authentication
© 2022
2020-02 SAP SE. All rights reserved. 615
SAP Support Portal - How to request access
to “Display Security Alerts in SAP EarlyWatch Alert Workspace”
See
SAP Support Portal Release Notes - February 2020
S-users who lack a particular authorization can now request it through a
comfortable self-service. Requests can be made from within the tile catalog
as well as from the list of all your authorizations (e.g. click on you user and
choose menu item 'Authorizations and Functions').
Note 2871877 - Multiple security vulnerabilities in SAP EAM, add-on for MRO 4.0 by HCL
Note 2863397 - Missing Authorization Check in Automated Note Search Tool (ANST)
Short introduction for ANST
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2020-01 SAP SE. All rights reserved. 618
Obsolete Workarounds for System Recommendations
Note 2686105 - [OBSOLETE] HTTP error 0 when sending data to SAP via destination SAP-SUPPORT_PORTAL
Note 2833610 - [OBSOLETE] Download large volume of note data from SAP support backbone via web service
If you have used these notes, you should now remove workaround settings
via transaction SM30_DNOC_USERCFG_SR
(or in transaction DNO_CUST04 / table DNOC_USERCFG)
© 2022
2020-01 SAP SE. All rights reserved. 619
Note 2845401 - Missing Authorization check in Realtech RTCISM
The note points to normal software packages for ABAP (but does not contain automatic
correction instructions for SNOTE):
https://launchpad.support.sap.com/#/softwarecenter/search/RTCISM
https://launchpad.support.sap.com/#/softwarecenter/search/SAPK-10001INRTCISM
© 2022
2020-01 SAP SE. All rights reserved. 620
Note 2871877 - Multiple security vulnerabilities in SAP EAM, add-on
for MRO 4.0 by HCL for SAP S/4HANA 1809
This security note replaces KBA 2869792 “High priority security issue in the Add-On Product”
which had contained the same transport files.
© 2022
2020-01 SAP SE. All rights reserved. 621
Note 2822074 - Missing Authorization check in SAP NetWeaver
(ABAP Server)
➢ You can ignore the side-effect solving notes, which are not available anyway:
© 2022
2020-01 SAP SE. All rights reserved. 622
Note 2863397 - Missing Authorization Check in Automated Note
Search Tool (ANST)
The power of tools - How ANST can help you to solve billing problems yourself!
ANST is available as of
© 2022
2020-01 SAP SE. All rights reserved. 623
Automated Note Search & Customer Code Detection Tool (ANST)
Transaction ANST
= Report ANST_SEARCH_TOOL
Result
© 2022
2020-01 SAP SE. All rights reserved. 625
Automated Note Search & Customer Code Detection Tool (ANST)
Preparation for Dynamic Tracing which you need to go for RFC scenarios or Fiori applications:
Note 2286869 - ANST: Trace On/Off error "Dynamic Start and Stop cancelled by user“
You have to implement this note if required and you need the execute the manual activity in any case.
Transaction FILE:
© 2022
2020-01 SAP SE. All rights reserved. 626
Automated Note Search & Customer Code Detection Tool (ANST)
Example: Dynamic tracing for System Recommendations Object List – UPL/SCMON integration
1. Ensure to use the same application server for Fiori and ANST!
2. Navigate in the Fiori App just before the screen which you want to trace
7. Request notes list, sort or filter by Application Area and identify relevant notes
© 2022
2020-01 SAP SE. All rights reserved. 627
Automated Note Search & Customer Code Detection Tool (ANST)
Activate Trace
© 2022
2020-01 SAP SE. All rights reserved. 628
Automated Note Search & Customer Code Detection Tool (ANST)
Continue
Application
© 2022
2020-01 SAP SE. All rights reserved. 629
Automated Note Search & Customer Code Detection Tool (ANST)
Filter Results
© 2022
2020-01 SAP SE. All rights reserved. 630
Automated Note Search & Customer Code Detection Tool (ANST)
Identify specific
Notes
© 2022
2020-01 SAP SE. All rights reserved. 631
December 2019
Topics December 2019
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2019-12 SAP SE. All rights reserved. 633
Customer Connection Program
SAP Identity Management 8.0
https://blogs.sap.com/2019/12/09/customer-connection-program-for-sap-identity-management-8.0
Customers can submit improvement requests for SAP products in mainstream maintenance. The SAP
team will consider requests with a minimum of 10 supporting customers (by votes).
https://influence.sap.com/sap/ino/#/campaign/2085
© 2022
2019-12 SAP SE. All rights reserved. 634
Continuous Influence Session
SAP Cloud Identity Access Governance
https://influence.sap.com/sap/ino/#/campaign/1739
Modify the IPS job scheduler so that it gives more options than
just "Run every XX Minutes“ and add an option to schedule
IPS ReSync jobs
© 2022
2019-12 SAP SE. All rights reserved. 635
F4 Authorization check in Value Help
© 2022
2019-12 SAP SE. All rights reserved. 636
F4 Authorization check in Value Help
Note 2792518 - Introduction of activity value 'Value Help' in further authorization objects
➢ You need to adjust authorization proposals (SU25 and SU24) and roles (SU25 and PFCG) to
grant authorization for F4
You can omit this activity temporarily by applying the procedure described in note 2606478.
© 2022
2019-12 SAP SE. All rights reserved. 638
WINTER IS C𝕆MING - How to keep Connectivity to Support Backbone
SAP Solution
Sending System: System directly connected to SAP SAP Solution Manager 7.2
Manager 7.1
The filter settings are compiled into the URL, therefore you can use the URL from the address
bar to show this alert „Service Readiness → SAP Backbone Connectivity“ for all system for
which the current S-user is authorized:
https://launchpad.support.sap.com/#/ewasolutionfinder/generic/filters/categoryHash=W3siY2F0
ZWdvcnkiOiJTZXJ2aWNlUmVhZGluZXNzIiwic3ViY2F0ZWdvcnkiOiJCYWNrYm9uZUNvbm5lY3R
pdml0eSJ9XQ%253D%253D
© 2022
2019-10 SAP SE. All rights reserved. 644
Are you ready? Check EWA Alert about SAP Backbone Connectivity
© 2022
2019-12 SAP SE. All rights reserved. 645
Are you ready? Check EWA Alert about SAP Backbone Connectivity
Yes !
WebService in use
HTTPS is in use
© 2022
2019-12 SAP SE. All rights reserved. 646
Note 2865869 - Technical Communication User Required to Connect
to SAP - Anonymous User Login Denied
For a limited period of time your systems can continue to access the SAP Support Backbone with RFC.
To ensure functionality of the RFC destination, replacing the anonymous user with a technical communication user is
the only mandatory action in the system.
RFC to SAP Support Backbone can only be used for the following functionality from January 2020 onwards:
SAP Note Assistant (transaction SNOTE) and EarlyWatch Alert (EWA / transaction SDCCN). This is a restriction especially for
Solution Manager systems: all Solution Manager specific applications are not supported.
➢ Service Data Control Center (SDCC, transaction SDCCN) supports the following functionality with connection to SAP Support
Backbone:
• Send session data:
Is used to send service data, especially that of the Earlywatch Alert, to SAP. It is also used for the license measurement data.
• Refresh service definitions:
Keeps the service definitions up to date. The service definitions are the list of function modules collected as service data for the EWA (or any
other service) in SDCC.
• Service Preparation - Service Recommendation Refresh:
RTCCTOOL connects to SAP Support Backbone for the Service Preparation - Service Recommendation Refresh. It updates the content of
the Service Recommendation (the checklist in RTCCTOOL).
➢ SAP Note Assistant (transaction SNOTE) supports the download and implementation of digitally signed SAP Notes.
© 2022
2019-12 SAP SE. All rights reserved. 647
November 2019
Topics November 2019
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2019-11 SAP SE. All rights reserved. 649
Secure By Default: Ways To Harden Your Systems
In case of an upgrade SAP recommends to implement (at least) the same settings as described in
note 2714839 respective note 2713544 “New security settings during conversion to S/4HANA 1909”
Both notes show currently the same checklist:
New_Security_Settings-SUM20P6_Conversion-to-S4H1909.xlsx
© 2022
2019-11 SAP SE. All rights reserved. 650
Secure By Default: Ways To Harden Your Systems
ERP 6.0
Supported Life Cycle Scenarios EhP 8
with Secure by Default settings
ENHANCEMENT PACKAGE
SYSTEM
CONVERSION INSTALLATION
SYSTEM
CONVERSION S/4HANA S/4HANA
19xx 19xx
SYSTEM COPY
SYSTEM
CONVERSION
UPGRADE
S/4HANA
20xx
© 2022
2019-11 SAP SE. All rights reserved. 651
Secure By Default: Ways To Harden Your Systems
1023437 login/password_downwards_compatibility 0 2838480 Security Audit Log configuration See note 2676384
2788140 icm/HTTP/logging_0 […] LOGFORMAT=%t %a %u1 \"%r\" %s %b %Lms %{Host}i %w1 %w2
© 2022
2019-11 SAP SE. All rights reserved. 652
System Recommendations – Important Notes
Note 2825239 - SysRec 7.2: Performance Improvement in SysRec Job in SP08 and SP09
Note 2833610 - SysRec 7.2: Download large volume of note data from SAP support backbone
via web service
Transaction DNO_CUST04:
Note 2780862 - SYSREC7.2: Required notes missing which have been published on the very
last day of a month
© 2022
2019-11 SAP SE. All rights reserved. 653
System Recommendations – Important Notes
Note 2747922 - SysRec: Corrections for Solution Manager 720 SP08 Fiori UI
Note 2747922 - SysRec: Corrections for Solution Manager 720 SP08 Fiori UI (version 1.8.5)
Note 2854704 - SysRec: Corrections for Solution Manager 720 SP09 Fiori UI (version 1.9.77)
A new feature allows you to show the note version on the Notes List (change setting required):
© 2022
2019-11 SAP SE. All rights reserved. 655
Note 2393937 - VMC Authority Check
The Virtual Machine Container (VMC), i.e. used Within ABAP you just see empty function stubs
in CRM systems, provides remote-enabled to allow ABAP developers to see the interface:
Java modules (jRFC) which can be called like
any other RFC enabled functions of external
RFC servers.
© 2022
2019-11 SAP SE. All rights reserved. 656
Note 2393937 - VMC Authority Check
The Virtual Machine Container (VMC) of an ABAP system is not active by default
… or even simpler:
© 2022
2019-11 SAP SE. All rights reserved. 657
Note 2393937 - VMC Authority Check
Access to remote enabled functions in external RFC servers is not restricted by authorization
object S_RFC (which is a check performed by an ABAP RFC server only).
Exception: the VMC of an ABAP system can run authorization check for S_RFC (citation needed)
Related notes:
Note 863354 - Using the "VM container" component
Note 658464 - Security check of IPC (with references to some other notes)
Note 412309 - Authorization profile RFC user for IPC
Related topics:
Note 720523 - IPC security: Maintaining params for SSL secured connections
Note 698181 - IPC security: Maintaining parameters for SNC-RFC connections
© 2022
2019-11 SAP SE. All rights reserved. 658
Note 2393937 - VMC Authority Check
Transaction SM53
Which users require the role containing authorizations for S_RFC and IPC?
The IPC - SACF scenario for AP Engines cannot be analyzed in transaction SACF, it can be analyzed
with the VMC logs in transaction SM53. In order to see the needed VMC warnings logs, the default
severity needs to be changed from ERROR to WARNING for the
category /Applications/AP/BASE/Core
In order to build a user list, which are using the AP Engines, the VMC logs need to be analyzed.
Check the logs for category /Applications/AP/BASE/Core and extract the users to build the user
lists. This analysis needs to be done on each application server.
Use the user list to update all corresponding roles which are using the AP Engines.
© 2022
2019-11 SAP SE. All rights reserved. 660
Note 2777910 - Unrestricted File Upload vulnerability in AS Java
(Web Container)
Why do you not see patches for old Support Packages?
a) It could be the case that the vulnerability was introduced with a specific SP.
However, the reference to the workaround described in related note 1975430 indicates that
this particular security vulnerability exist in all releases.
Software Support Published
~Age Patch Published
Component Package (Last changed)
b) Support Packages which are older ENGINEAPI 7.10 SP021 08.08.2016 38 month
than 24 month do not necessarily ENGINEAPI 7.10 SP022 27.07.2017 27 month
get (security) patches anymore ENGINEAPI 7.10 SP023 10.05.2018 17 month
ENGINEAPI 7.10 SP024 10.05.2019 5 month 000002 20.06.2019
However, it seems that there exist ENGINEAPI 7.10 SP025 Not available yet 000000 Not available yet
© 2022
2019-11 SAP SE. All rights reserved. 661
Note 2839864 - Update 2: OS Command Injection vulnerability in
SAP Diagnostics Agent
By applying the patch the file commands.xml will be cleared of all commands except echo:
<OsCmd exec="echo Hello" param="false" >
As a result, commands for the OS Command Collector have to be added manually to the
commands.xml. For reference the old_commands.xml is attached to the note.
In case commands need to be added for this purpose, it is strongly recommended to use setting
param="false".
© 2022
2019-11 SAP SE. All rights reserved. 662
Note 2839864 - Update 2: OS Command Injection vulnerability in
SAP Diagnostics Agent
Which commands are required?
1. OS
The old commands.xml shows various topics 2. TREX (TREX commands have been removed
which might require commands if you are use transaction TREXADMIN in Solution Manager)
using these scenarios: 3. SAP MDM
4. SAP PPM BY IDS
5. FOCUS ALM
6. SAP BCM SOFTWARE
7. SAP BPC FOR MICROSOFT/NETWEAVER
8. SAP PRICE & MARGIN MANAGEMENT
9. SAP POS
10. SAP ARC&DOC ACCESS BY OT
11. BOBJ ENTERPRISE XI
12. VERTEX
13. WEBSPHERE APPSERVER
14. SAP MFG EXECUTION
15. SBOP DATA SERVICES 4.0
H. Help
© 2022
2019-11 SAP SE. All rights reserved. 663
Note 2839864 - Update 2: OS Command Injection vulnerability in
SAP Diagnostics Agent
Which commands are required?
Note 2849096 - MSC: Cannot find command DateTime and CpuStat in command list
Using this note you can replace both commands by still existing echo command.
Instead of implementing and running the report you can use
transaction SE16 for table DMDATTRIBUTE as well:
report p_update_os_command_check.
update DMDATTRIBUTE
set value = 'Echo'
where model_key = 'Setup'
and model_class = 'ST SELBSTDIAGNOSE'
and attrib_class = 'param_value'
and ( value = 'CpuStat' or value = 'DateTime' ).
© 2022
2019-11 SAP SE. All rights reserved. 664
Support Backbone Connectivity – SDCCN
Note 2837310 - Supporting HTTPS Connections for SDCCN
On ST-PI 2008_1_7xx, Service Data Control Center (SDCC, transaction SDCCN) only supports
RFC connections to SAP Support Backbone. HTTPS connections are not supported. In
particular, Solution Manager 7.1 is not capable to connect to SAP Support Backbone after
January 1st 2020 due to this missing functionality. An SAP Solution Manager system is no more
allowed to communicate with SAP Support Backbone with RFC protocol.
This SAP Note provides the functionality allowing to connect a Solution Manager 7.1 to SAP
Support Backbone using secure https connections for the functionality provided by SDCC.
© 2022
2019-11 SAP SE. All rights reserved. 665
Support Backbone Connectivity – SDCCN
Note 2837310 - Supporting HTTPS Connections for SDCCN
Related information:
Note 2740667 - RFC connection SAPOSS to SAP Service & Support backbone will change
(latest) in January 2020
Checklist for Support Backbone Update For SAP Solution Manager 7.2 SPS 5
https://help.sap.com/doc/20f8ecd5028346a38fac89c2f3052bf6/SP5/en-
US/loiob0605883e376454abce03682db18e39d_sps5.pdf
© 2022
2019-11 SAP SE. All rights reserved. 667
Note 2836302 - Automated guided steps for enabling Note Assistant
for TCI and Digitally Signed SAP Notes
Report RCWB_SNOTE_AUTOMATE_DWNLD_PROC
Troubleshooting:
Note 2857602 - Report from SAP Note 2836302 is hanging in Step4
→ Finish the SPAM queue and make sure that the status is green
© 2022
2019-11 SAP SE. All rights reserved. 668
Are you ready? Check EWA Alert about SAP Backbone Connectivity
EWA Workspace
https://launchpad.support.sap.com/#/ewaworkspace
© 2022
2019-11 SAP SE. All rights reserved. 669
Are you ready? Check EWA Alert about SAP Backbone Connectivity
EWA Workspace
https://launchpad.support.sap.com/#/ewaworkspace
1. Open Alerts (= EWA Solution Finder)
2. Remove „Alert Rating“ filter
3. Remove „Age“ filter
4. Choose „Alert Category“
„Service Readiness → SAP Backbone Connectivity“
© 2022
2019-11 SAP SE. All rights reserved. 670
Are you ready? Check EWA Alert about SAP Backbone Connectivity
Overview about
systems
© 2022
2019-11 SAP SE. All rights reserved. 671
Are you ready? Check EWA Alert about SAP Backbone Connectivity
© 2022
2019-11 SAP SE. All rights reserved. 672
Are you ready? Check EWA Alert about SAP Backbone Connectivity
© 2022
2019-11 SAP SE. All rights reserved. 673
Are you ready? Check EWA Alert about SAP Backbone Connectivity
The filter settings are compiled into the URL, therefore you can use the URL from the address
bar to show this alert „Service Readiness → SAP Backbone Connectivity“ for all system for
which the current S-user is authorized:
https://launchpad.support.sap.com/#/ewasolutionfinder/generic/filters/categoryHash=W3siY2F0
ZWdvcnkiOiJTZXJ2aWNlUmVhZGluZXNzIiwic3ViY2F0ZWdvcnkiOiJCYWNrYm9uZUNvbm5lY3R
pdml0eSJ9XQ%253D%253D
© 2022
2019-11 SAP SE. All rights reserved. 674
SAP Backbone Connectivity
a) Get Software
➢ SAP Solution Manager 7.2 SP 8
➢ Kernel (Release 742 patch ≥ 401, Release 745 patch ≥ 400, Release > 745)
➢ ST-PI AddOn (ST-PI 740 SP10, ST-PI 2008_1_700 SP20, ST-PI 2008_1_710 SP20, ST-A/PI 01T* SP01)
➢ Note Assistant, Transaction SNOTE (Notes 2576306 2603877, 2632679, 2721941, 2813264, …)
➢ Task List for (partly) automated configuration (Note 2827658)
b) Configure Backbone Connectivity
➢ Create technical S-user on SAP Support Backbone
➢ Update PSE with certificates (CA certificate plus optional client certificate)
➢ Create web service destination
➢ Activate new connection for Note Assistant, transaction SNOTE
c) Go-live
➢ Check application log if SNOTE loads digitally signed notes via web service connection
➢ Check Workload Statistics if web service connections are used and RFC destinations are not used
© 2022
2019-11 SAP SE. All rights reserved. 675
SAP Backbone Connectivity
© 2022
2019-11 SAP SE. All rights reserved. 676
October 2019
Topics October 2019
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2019-10 SAP SE. All rights reserved. 678
SAP EarlyWatch Alert Workspace - Security Status
https://launchpad.support.sap.com/#/ewaworkspace
New card Security Status added to the SAP EarlyWatch Alert Workspace:
Reports
The new authorization is initially assigned to super
Support Desk Evaluation
administrators only.
Users can receive the authorization from super Service Reports and Feedback
administrators or from user administrators (if they
Display Security Alerts in SAP
themselves got the authorization).
EarlyWatch Alert Workspace
My Support Program Report
See Release Notes
URL Destination
https://notesdownloads.sap.com SAP-SUPPORT_NOTE_DOWNLOAD
https://documents.support.sap.com SAP-SUPPORT_PARCELBOX
https://apps.support.sap.com/dummy SAP-SUPPORT_PORTAL
https://softwaredownloads.sap.com
https://servicepoint.sap.com
…
© 2022
2019-10 SAP SE. All rights reserved. 680
Java: Guest user is not an Administrator
No-brainer
No other groups
than expected
No other users
Use proposed roles and users – Example for XI:
than expected
UME Roles and Actions (AS Java)
https://help.sap.com/viewer/bd0c15451669484cbc84a54440340179/7.5.16/en-US/61908817bfae4c36a051d95b5a245364.html
© 2022
2019-10 SAP SE. All rights reserved. 681
Java: Guest user is not an Administrator
What about other users having role Administrator?
© 2022
2019-10 SAP SE. All rights reserved. 682
Note 2786151 - Denial of service (DOS) in Kernel (RFC), SAP GUI for
Windows and for Java
1st version from 10.09.2019 (v12), updated on 24.09.2019 (v13): no change of patches between
these publications
Section “Reason and Prerequisites” gives hints for your risk decision: The potential DOS
attack is only possible if un-encrypted RFC connection is possible (no SNC) and if RFC trace is
raised to trace levels 2 or 3 (default is 1). A successful attack would crash the work process
with core dump instead of triggering a normal short dump.
Corrections:
Both corrections solve the same issue but are not dependent on each other
© 2022
2019-10 SAP SE. All rights reserved. 683
Note 2828682 - Information Disclosure vulnerability in SAP
Landscape Management Enterprise
Perform the manual correction instruction that are described in this SAP Note. Execute at least
goal 1 to update configuration parameters
Product Page:
www.sap.com/lama
Community Page:
www.sap.com/lama-community
Documentation:
https://help.sap.com/viewer/product/SAP_LANDSCAPE_MANAGEMENT_ENTERPRISE/3.0.12.0/en-US
What’s New:
https://help.sap.com/viewer/98cc0d7a1caa44bf9618f35fae6eb6cb/3.0.12.0/en-US
© 2022
2019-10 SAP SE. All rights reserved. 684
September 2019
Topics September 2019
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2019-09 SAP SE. All rights reserved. 686
DSAG - Customer Influence Voting
https://influence.sap.com/sap/ino/#/campaign/1107/ideas
Automated password management of technical user accounts
https://influence.sap.com/sap/ino/#/idea/231149
The requested new solution implements a central software component, that is capable to change
passwords of technical users in SAP systems (ABAP, JAVA, Business Objects) either manually
triggered or automatically in a defined schedule (e.g. every n days, every last Saturday of a
month) using a given password policy. It includes the password change in the password store
(ABAP - SU01, Java - UME , etc.) and in all calling systems (at first SAP systems, but third party
systems are in scope in general).
RFC communications can be secured using SNC. However, the established security context is a
machine-to-machine one. The individual RFC interface user is not authenticated that way but still
by either password or TrustedRFC methods only. While TrustedRFC is not a viable option for all
cases, using passwords is error-prone and requires a high maintenance effort when policies
demand a frequent password cycling. As a solution, it should be possible to authenticate the
individual, called RFC user on the receiving side via X.509 authentication methods.
© 2022
2019-09 SAP SE. All rights reserved. 687
DSAG - Customer Influence Voting
https://influence.sap.com/sap/ino/#/campaign/1107/ideas
➢ not planned
➢ still in scope, as related to ongoing investigation about "RFC over WebSockets“ which
would allow authentication and encryption based on TLS with client certificates
© 2022
2019-09 SAP SE. All rights reserved. 688
SAP Support Backbone Connectivity – Download Service
The most important use case for the ABAP Download Service is downloading from SAP file
shares connected to the SAP Support Portal and the download of SAP Notes with all their
dependencies and relevant SAP Notes transport-based correction instructions (TCIs).
The Download Service is part of SAP Solution Manager 7.2, however, as it’s a basis component
any ABAP system can be used as download service system. You can connect other systems to
the download service system via RFC.
© 2022
2019-09 SAP SE. All rights reserved. 689
SAP Support Backbone Connectivity – Download Service
Webservice
Download Service RFC
Note Application
CI + TCI CI + TCI
CI TCI
SNOTE / SPAM
Get it via Get it via
SNOTE manual
Download
or CI only
Download SNOTE / SPAM
Service
© 2022
2019-09 SAP SE. All rights reserved. 690
SAP Support Backbone Connectivity – Download Service
Required correction notes
Note 2456654 - Adjustment of SAP NetWeaver Download Service for new download locations
Note 2503500 - Proxy configuration for SAP NetWeaver Download Service
with manual implementation activities
➢ Valid for (=minimal possible version) SAP_BASIS 700 SP 32-34, 701 SP 17-19, 702 SP 17-19,
710 SP 19-22, 711 SP 14-17, 730 SP 13-17, 731 SP 14-20, 740 SP 9-17, 750 up to SP 9,
751 up to SP 3, 752 w/o SP
➢ Solved with (= recommended version) SAP_BASIS 700 SP 36, 701 SP 21, 702 SP 21,
710 SP 23, 711 SP 18, 730 SP 19, 731 SP 23, 740 SP 20, 750 SP 11, 751 SP 6, 752 SP 1
© 2022
2019-09 SAP SE. All rights reserved. 691
SAP Support Backbone Connectivity – Download Service
Activation
On a Download Service System:
1. Maintain S-User and execution parameters using transaction SDS_CONFIGURATION
Required roles SAP_BC_SDS_CONF_ADMIN respective SAP_BC_SDS_TASK_USER
2. Install client certificates according note 2620478 using transaction STRUST
3. Adapt proxy settings (if required)
4. Configure HTTPS service (if required)
5. Set up download directory (if required)
6. Set up SL protocol service (if required)
On all systems:
➢ Configure applications like SNOTE or LMDB to use the Download Service locally or remotely
© 2022
2019-09 SAP SE. All rights reserved. 692
SAP Support Backbone Connectivity – Download Service
Activation
Required authorizations for remote user in Download Service System
inspired by role SAP_BC_SDS_TASK_USER / authorization trace using transaction STAUTHTRACE
Authorization
Field 1 Value 1 Field 2 Value 2 Field 3 Value 3
object
SDS_APPLICATION
S_RFC RFC_TYPE FUGR RFC_NAME STC_TM_API ACTVT 16
STC_TM_FUNCTIONS
S_RFC RFC_TYPE FUNC RFC_NAME FUNCTION_EXISTS ACTVT 16
S_BTCH_ADM BTCADMIN Y
© 2022
2019-09 SAP SE. All rights reserved. 693
SAP Support Backbone Connectivity – Download Service
Configuration for SNOTE
If not available yet, you get this report via note 2576306 (complete via TCI) respective
note 2508268 (with manual implementation steps)
© 2022
2019-09 SAP SE. All rights reserved. 694
SAP Support Backbone Connectivity – Download Service
Configuration for LMDB
Note 2756210 - Configuration of SAP Netweaver Download Service for LMDB Content import
automation
© 2022
2019-09 SAP SE. All rights reserved. 695
SAP Support Backbone Connectivity – Update of Task List
© 2022
2019-09 SAP SE. All rights reserved. 697
How to reload Message Server ACL
© 2022
2019-09 SAP SE. All rights reserved. 698
Notes 2362078, 2624688, 2778519 – Secure System Internal
Communication
➢ SAP_BASIS 7.40 SP 11
➢ Kernel release 749 with patch >= 710
➢ Kernel release 753 with patch >= 416
➢ Kernel release 773 with patch >= 121
➢ Kernel release > 773
© 2022
2019-09 SAP SE. All rights reserved. 699
Note 2813809 - SOS: Release dependent changes of the data
collector
The data collectors within the managed systems of the following checks had to be revised due to
release dependent changes:
• Users who are authorized to Call Function Modules for User Admin (0019)
• Users who are authorized to Disable Authorization Checks Within Transactions (0102)
• Users who are authorized to Maintain Trusted Systems (0240)
• Users who are authorized to Maintain Trusting Systems (0268)
• Users who are authorized to Activate ICF Services (0655)
• Users who are authorized to Delete Payroll Results (0951)
This issue is corrected with release 01U* (Support Package 0) of the ST-A/PI application service tools.
© 2022
2019-09 SAP SE. All rights reserved. 700
Note 2838480 - SAL | Secure By Default (as of SAP_BASIS 7.54)
Note 2676384 - Best practice configuration of the Security Audit Log
Profile Parameters respective Kernel Parameters:
• rsau/enable = 1
• rsau/user_selection = 1
• rsau/selection_slots = 10 (or higher)
• rsau/integrity = 1 (if available according to note 2033317)
• Target: Database (if available)
Filters:
• All clients *, user SAP#*: Record all events for user SAP*
The character # serves to mask * as non-wildcard.
• All clients *, user <your emergency user IDs>*: Record all events
• Client 066, all users *: Record all events
• All clients *, all users *: Record all events except events which might produce high volume
AUW, AU5, AUK, CUV, DUR, and EUE. Deactivate these events via "Detailed Display"
© 2022
2019-09 SAP SE. All rights reserved. 701
August 2019
Topics August 2019
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2019-08 SAP SE. All rights reserved. 703
Note 2786035 - Code Injection vulnerabilities in SAP Commerce Cloud
Note 2697573 - Cross-Site Scripting (XSS) vulnerability in SAP Commerce / SAP Hybris
Solution:
SAP Hybris Commerce 6.7 or later
• You need authorizations for debug-display in any case (S_DEVELOP with OBJTYPE=DEBUG
and ACTVT=03) which should be considered as critical anyway
© 2022
2019-08 SAP SE. All rights reserved. 705
Note 668256 - Using HTTP/external debugging
Note 668252 - Authorization check for HTTP/external debugging
Mitigation:
• Both users require authorizations for debug-display
• Authorization as choosen by parameter abap/authority_to_catch_for_debugging
required, e.g. for S_DEVELOP with OBJTYPE=DEBUG and ACTVT=90 is required
© 2022
2019-08 SAP SE. All rights reserved. 707
Note 2286679 - Clickjacking Framing Protection in JAVA
How to check if Clickjacking Protection is active
The new version of the note describes how to check if Clickjacking Protection is active on a
Java server:
URL: http[s]://<host>:<port>/sap.com~tc~lm~itsam~servlet~clickjacking/check
© 2022
2019-08 SAP SE. All rights reserved. 709
SAP Support Backbone Connectivity
Check usage of RFC Destinations
Transaction ST03N
shows the usage of
RFC Destinations
→
Ensure that none of
these destinations
are still in use
Filter for
destinations:
SAPCMP
SAPOSS
SAP-OSS
SAPNET_RTCC
SAP-OSS-LIST-O01
© 2022
2019-08 SAP SE. All rights reserved. 710
SAP Support Backbone Connectivity
Check usage of RFC Destinations
© 2022
2019-08 SAP SE. All rights reserved. 711
SAP Support Backbone Connectivity
Check usage of Webservice
Transaction ST03N
shows the usage of
Webservices
→
Check that the new
webservices are
used
© 2022
2019-08 SAP SE. All rights reserved. 712
July 2019
Topics July 2019
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2019-07 SAP SE. All rights reserved. 714
Note 2808158 - OS Command Injection vulnerability in SAP
Diagnostics Agent
The SAP Diagnostics Agents get patched by a special procedure on the SolMan describe here:
“Since the number of allowed control characters has been reduced, it should be checked if all used
commands still work, especially those manually added to the commands.xml.”
→ If you do not know what this is about, you most likely do not need to do anything, however, this may
be an opportunity to validate existing set of allowed OS commands which can be executed via the
Diagnostics Agent.
© 2022
2019-07 SAP SE. All rights reserved. 715
Note 2808158 - OS Command Injection vulnerability in SAP
Diagnostics Agent
© 2022
2019-07 SAP SE. All rights reserved. 716
Note 2808158 - OS Command Injection vulnerability in SAP
Diagnostics Agent
© 2022
2019-07 SAP SE. All rights reserved. 717
Note 2812152 - Update 1 to Security Note 2643447
Side effect solving note, which is required if you install respective have installed note 2643447
via SNOTE
© 2022
2019-07 SAP SE. All rights reserved. 718
Note 2774742 - Cross-Site Scripting (XSS) vulnerability in ABAP
Server and ABAP Platform
The note implements secure default configuration in SAP_BASIS 7.51, 7.52, 7.53
but keeps insecure default in SAP_BASIS 7.00, 7.01, 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50.
If you are using SAP Content Management (see SICF path /sap/bc/contentserver)
and want to activate secure configuration in old releases you need to execute both manual
activities:
1. The manual pre-implementation about modifying value range of DDIC domain SDOK_PFNAM
enables you to maintain the setting (transportable). You can install a Support Package instead.
2. The manual post-implementation about maintaining table SDOKPROF using SE16 describes
how to enter either insecure value inline (a file is displayed directly in the browser) or secure
value attachment (the browser shows a download popup).
As there is no automatic transport, use SE16 to add the entry on a workbench transport
manually. This step is required even if you install a Support Package.
© 2022
2019-07 SAP SE. All rights reserved. 719
Note 2738791 - Information disclosure in SAP NetWeaver AS Java
(Startup Framework)
Note 2191612 - FAQ | Use of Security Audit Log as of SAP NetWeaver 7.50
1. Can transactions SM18, SM19, and SM20 still be used in parallel with RSAU_CONFIG,
RSAU_READ_LOG, and RSAU_ADMIN?
…we recommend against mixed usage, since the settings for the new functions are not
detectable in the old environment and - particularly in SM18 and SM19 - are ignored or
accidentally overwritten.
Tip: Use transaction SM01_CUS in 000 clients to lock the "old" applications once you have
switched to the current concept.
© 2022
2019-07 SAP SE. All rights reserved. 721
Security Audit Log as of 7.50
Important corrections
Configuration:
Reporting:
© 2022
2019-07 SAP SE. All rights reserved. 722
The intermediate Support Backbone Update Guide
Overview
Concerning the Note Assistant, transaction SNOTE, several steps are required:
1. Get updated software (main part from September 2017) plus some smaller updates
(notes 2603877, 2632679, 2721941, 2813264, …)
2. Request technical S-users via User for Support Hub Communication application
and wait for 1 day
(preferred: 1 user per system; acceptable: 1 user per system line DEV-TST-PRD;
not recommended: 1 user per installation or per customer number)
3. Adjust destinations
a) Up to release 7.31, replace generic user OSS_RFC with specific technical S-user in RFC
Destinations SAPOSS, etc. as described in note 2740667
b) As of release 7.40, adjust RFC Destinations SAPOSS, etc. and create http destinations
SAP-SUPPORT_PORTAL, SAP-SUPPORT_PARCELBOX, SAP-SUPPORT_NOTE_DOWNLOAD as
described in note 2827658 (which replace old notes 2793641 and 2738426)
© 2022
2019-07 SAP SE. All rights reserved. 724
The intermediate Support Backbone Update Guide
Request Technical Communication User
https://launchpad.support.sap.com/#/user/management
→ https://launchpad.support.sap.com/#/techuser
© 2022
2019-07 SAP SE. All rights reserved. 725
The intermediate Support Backbone Update Guide
Bonus: Note 2805811 - Enable client certificate authentication for tech. users
The Technical Communication User application allows you to administer user IDs used in
system-to system connections between your company’s landscape (most commonly in your
SAP Solution Manager) and the SAP Support backbone. This application has now been
enhanced and integrated into the User Management application.
From the User Management application, you can jump into the Technical Communication User
application through a dedicated tab.
Like before, you can request new users and activate them, delete existing ones, or change their
passwords. In addition, if you want to exchange data with the SAP Support infrastructure using
client certificate authentication, you can now generate SAP Passports for technical
communication users (optional). This way you avoid the need to manage passwords.
© 2022
2019-07 SAP SE. All rights reserved. 726
The intermediate Support Backbone Update Guide
(Partly) Automated Configuration of new Support Backbone Communication
Preparation: Manual
activity to find and
download the required
certificates which you
then upload into
transaction STRUST
This step is useless, as you do not Enter user credentials of Technical Communication
Restart ICM, too want to use old RFC destinations
User, scroll down and activate all three checkboxes
anyway (and you would have to
change the user afterwards as well). „Overwrite existing destination“
© 2022
2019-07 SAP SE. All rights reserved. 728
The intermediate Support Backbone Update Guide
Note 2793641 – (Partly) Automated Configuration
© 2022
2019-07 SAP SE. All rights reserved. 729
The intermediate Support Backbone Update Guide
Note 2793641 – (Partly) Automated Configuration
Check adjusted SAP destinations using report
RSRFCCHK (clear field ‚Connection Type‘)
© 2022
2019-07 SAP SE. All rights reserved. 730
The intermediate Support Backbone Update Guide
Note 2793641 – (Partly) Automated Configuration
Check adjusted SAP destinations using report
RSRFCCHK (clear field ‚Connection Type‘)
ok
© 2022
2019-07 SAP SE. All rights reserved. 731
The intermediate Support Backbone Update Guide
Note 2721941 - Download of digitally signed note via https
© 2022
2019-07 SAP SE. All rights reserved. 732
The intermediate Support Backbone Update Guide
Note 2721941 - Download of digitally signed note via https
Finally you switch SNOTE from using RFC to connecting via https:
Transaction CWB_SNOTE_DWNLD_PROC = Report RCWB_SNOTE_DWNLD_PROC_CONFIG
Enter the new destinations SAP-SUPPORT_PORTAL and SAP-SUPPORT_NOTE_DOWNLOAD
Bonus: Transport based Correction Instruction (TCI) packages and prerequisite notes are
downloaded automatically via remote access to Download Service of SAP Solution Manager 7.2
© 2022
2019-07 SAP SE. All rights reserved. 733
The intermediate Support Backbone Update Guide
Verification
Use SNOTE to download and install a note, then check the log:
ok ok
© 2022
2019-07 SAP SE. All rights reserved. 734
The intermediate Support Backbone Update Guide
Verification
You can use report SCWB_NOTE_MONITOR, too:
Msg. 158 Note … downloaded in version … (using RFC SAPOSS) very old
Msg. 823 Digitally signed SAP Note … downloaded ... using RFC old
Msg. 824 Digitally signed SAP Note … downloaded ... using HTTP ok
Msg. 825 Digitally signed SAP Note … downloaded ... using download service ok
old
ok
© 2022
2019-07 SAP SE. All rights reserved. 735
June 2019
Topics June 2019
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2019-06 SAP SE. All rights reserved. 737
How to get rid of Act Now! (if already done…)
The Support Portal shows a message box for all notes having ABAP correction instructions:
Act Now! SAP Notes Download and Upload Process Impacted. From January 1, 2020, the download and upload
process will stop working unless Note Assistant (SNOTE transaction) is enabled in ABAP systems to work with digitally
signed SAP Notes. Learn more about actions required from your side on the SAP Support Portal page for Digitally
Signed SAP Notes. To understand the overall impact of the SAP Support Backbone update, refer to SAP Support Portal.
➢ Use AdBlock rules which remove elements from a page (you might need more entries):
DIV[id="__xmlview2--idOSSRetiredMsg"]
DIV[id="__jsview3--idforRetireOSS"]
➢ Use a TamperMonkey Script, which e.g. inserts a global CSS style to hides the elements
$('head').append('<style type="text/css">#__xmlview2--idOSSRetiredMsg,
#__jsview3--idforRetireOSS { display: none; }</style>');
© 2022
2019-06 SAP SE. All rights reserved. 738
How to get rid of Act Now! (if already done…)
TamperMonkey Script
// ==UserScript==
// @name Hide_OSSRetiredMsg
// @namespace http://tampermonkey.net/
// @version 1.0
// @description Remove "Act Now! SAP Notes Download and Upload Process Impacted."
// @author Frank Buchholz, SAP SE
// @match https://launchpad.support.sap.com/
// @grant none
// ==/UserScript==
function addGlobalStyle(css) {
var head, style;
head = document.getElementsByTagName('head')[0];
if (!head) { return; }
style = document.createElement('style');
style.type = 'text/css';
style.innerHTML = css;
head.appendChild(style);
}
© 2022
2019-06 SAP SE. All rights reserved. 739
Note 2070691 - Potential information disclosure relating to database
server file system
The original version 4 of note 2070691 didn’t covered all releases and introduced a side-effect
error which is solved in note 2708068. The new version 6 contains the same solution and covers
all relevant releases.
You can install one of both notes to get the same solution (which is e.g. part of ST-PI 7.40 SP 11)
SNOTE will state, that there is no need to install the other one:
© 2022
2019-06 SAP SE. All rights reserved. 740
Note 2748699 - Information Disclosure in Solution Manager 7.2
CA Introscope Enterprise Manager
Procedure:
1. Apply patch of note 2748699 on SAP Solution Manager (and check note 1579474)
2. Apply patch of related notes 2534316 (for Introscope 10.5) respective 2285189 (for
Introscope 10.1) depending on the installed version
3. Change password of user SM_EXTERN_WS (respective the user which you have designated
for this purpose) in the SAP Solution Manager via transaction SOLMAN_SETUP → "Cross
Scenario Configuration" → "Mandatory Configuration" → "System Preparation" →
"Maintain Technical Users"; Use Case ID is SM_EXTERN_WS (Do not use transaction SU01)
© 2022
2019-06 SAP SE. All rights reserved. 741
Note 1997734 - Missing authorization check in RFC runtime
With this correction from 2015 you could be a little bit more lazy in case of scenario “Single
Sign-On via Trusted RFC” concerning authorizations for S_RFCACL field RFC_USER … but it’s
still recommended to work with strict authorizations:
Bad, instead enter list
of systems / clients
Central Payment is released in S/4HANA 1709 with the status “Released with Restrictions”
© 2022
2019-06 SAP SE. All rights reserved. 743
Note 1529849 - Gateway security setting on SCS instance, AS Java
General rule (if required at all): Start of RFC servers not required. Only local registered RFC servers
available.
secinfo
# start of external programs disabled (no entry required)
reginfo
# list of java servers
p TP=* HOST=local
p TP=* HOST=<host name>
...
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=491913782
© 2022
2019-06 SAP SE. All rights reserved. 745
RFC Gateway and Message Server – Logging and Monitoring
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=491913782
© 2022
2019-06 SAP SE. All rights reserved. 746
ETD for RFC Gateway and Message Server Monitoring
Launchpad
© 2022
2019-06 SAP SE. All rights reserved. 747
ETD for RFC Gateway and Message Server Monitoring
Preparation: Log Learning of Log Type “SAP Message Server“
© 2022
2019-06 SAP SE. All rights reserved. 748
ETD for RFC Gateway and Message Server Monitoring
Event database
© 2022
2019-06 SAP SE. All rights reserved. 749
ETD for RFC Gateway and Message Server Monitoring
Anomaly Detection Lab
© 2022
2019-06 SAP SE. All rights reserved. 750
ETD for RFC Gateway and Message Server Monitoring
Attack Detection Patterns in Forensic Lab
© 2022
2019-06 SAP SE. All rights reserved. 751
May 2019
Topics May 2019
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2019-05 SAP SE. All rights reserved. 753
Extended availability for Security Corrections
Security fixes for SAP NetWeaver based products are also delivered with the support packages
of these products. For all SAP Security Notes with high or very high priority we provide this
service for support packages shipped within the last 24 months* (extended from 18 month).
*Exceptions are e.g. SAP Gui, Kernel, HANA which come with their own release strategy.
ABAP: no big difference as most ABAP Corrections Instructions cover all Support Packages of
releases which are in maintenance anyway (if technically possible)
Java: no big deal either, typically you can expect one more older Support Package which offers
a solution via patch (however, you most likely will go for an Support Package upgrade anyway)
➢ Go for regular, i.e. yearly Support Package upgrades (see note 2797813 , too)
© 2022
2019-05 SAP SE. All rights reserved. 754
RFC Gateway & Message Server vulnerabilities
You can find reports on SAP vulnerabilities that have hit the media by end of April (you can find
one example here or another in German here). The background of these reports were messages
from US-CERT and Reuters which refer to a presentation at OPCDE DBX 2019 that got picked up
quickly.
In order to demonstrate the urgency of the matter the security researchers published a modular
exploit kit that makes it even easier to attack these misconfigurations.
Please note that the reported vulnerabilities are basically misconfigurations in on-premise
installations SAP has addressed in multiple publications years ago. This is acknowledged by
other security companies that incited the coverage.
Two weeks later, the security researchers published some notes regarding the news release after
SAP OPCDE talk.
© 2022
2019-05 SAP SE. All rights reserved. 755
Architecture & Main Risks
Only on-premise ABAP (including S/4HANA) and Java (see note 1529849) based systems are affected.
When installing a new single system with SAP Basis >=740 using a most recent SWPM release, these
freshly created systems are properly secured concerning profile parameters.
However, systems that have been upgraded throughout the last years may still be vulnerable, including
those of SAP Basis >= 740.
If you did not misconfigure networks in a way that would allow RFC communications or Message Server
access to SAP systems from the Internet (which SAP strongly recommends not to do), the vulnerability can
be exploited from the customers intranet only, if at all.
You should review important SAP security recommendations, in particular the whitepaper “SAP Security
Recommendations: Securing Remote Function Calls (RFC)” concerning the RFC Gateway and the
Documentation of Message Server security.
© 2022
2019-05 SAP SE. All rights reserved. 757
RFC Gateway and Message Server
Configuration Settings
changeable in RFC Whitepaper EarlyWatch Alert Security Optimization Security Baseline
Topic Profile Parameter Recommended value
RZ11 Note 863362 Service Template 1.9
GW gw/acl_mode yes 1 yes yes yes (SY088) yes
GW gw/reg_no_conn_info yes 255 - yes yes (SY087) yes
GW gw/proxy_check - - - -
GW gw/sim_mode yes 0 yes - yes (0273) yes
GW gw/monitor yes 1 yes - Yes (0269) yes
GW gw/logging yes ACTION=SsZ (plus some more switches) yes - - -
GW gw/sec_info <file name> yes yes yes (SY089, 0282) -
GW gw/reg_info <file name> yes yes yes (SY089) -
GW gw/prxy_info <file name> - - - -
GW Non-trivial entries in the ACL files no * values for host yes yes yes yes
changeable in Documentation EarlyWatch Alert Security Optimization Security Baseline
Topic Profile Parameter Recommended value (party only description but no
RZ11 / SMMS Note 863362 Service Template 1.9
recommendation) + Notes
MS ms/acl_info <file name> Note 821875, 1421005 yes yes (SY094) yes
MS ms/audit yes 1 or 3 - - -
Default sapms<SID> (=36NN)
MS rdisp/msserv Note 821875, 1421005 yes yes (SY092) -
respective 0 on central Java SCS instance
MS rdisp/msserv_internal 39NN Note 821875, 1421005 yes yes (SY092) yes
MS ms/acl_file_int <file name> - - -
MS ms/monitor yes 0 Note 821875 yes yes (SY093) yes
MS ms/admin_port yes 0 Note 821875 yes yes (SY093) yes
MS ms/server_port_<xx> yes not set - - -
MS system/secure_communication ON Note 2040644 - - -
MS Non-trivial entries in the ACL files no * values - - yes
MS Firewall settings Note 821875 - (out of scope) - (out of scope) - (out of scope)
© 2022
2019-05 SAP SE. All rights reserved. 758
RFC Gateway and Message Server
Configuration Validation
ABAP
▪ Profile Parameters: ABAP_INSTANCE_PAHI
▪ RFC Gateway secinfo: GW_SECINFO
▪ RFC Gateway reginfo: GW_REGINFO
▪ Message Server ACL: MS_SECINFO
Java
▪ Profile Parameters: Parameters
▪ ACL files: -
See Security Baseline Template with Target Systems BL_S-7 and BL_S-8
© 2022
2019-05 SAP SE. All rights reserved. 759
RFC Gateway Security
RFC Gateway @ SAP Wiki
https://wiki.scn.sap.com/wiki/display/SI/RFC+Gateway
Rule in the
file? =0 Deny
yes no
gw/sim_mode
sec/reginfo =1
Secure default settings: maintained?
Permit all
gw/reg_no_con_info = 255 (at least bit 1 is set)
gw/acl_mode = 1
gw/sim_mode = 0 no =0 Permit all
© 2022
2019-05 SAP SE. All rights reserved. 760
Message Server Security
Notes 821875, 1421005, 1495075 plus 2040644
1. Split ports via Profile Parameters rdisp/msserv and rdisp/msserv_internal
(which allows to use a firewall with port filter between server network and user network)
2. Activate ACL list to block foreign servers
(which requires new operational instructions i.e. in case of a changing server landscape)
a. Recommended: on application level via Profile Parameter ms/acl_info using host names, domains or IP
patterns
b. Optional: on network level via Profile Parameters ms/acl_file_admin, ms/acl_file_ext,
ms/acl_file_extbnd, and ms/acl_file_int using IP patterns (like permit 10.18.0.0/16 )
3. Protect and encrypt internal connections of the Message Server via Profile Parameter
system/secure_communication
See same topic from 2018-12
The installation tool (but not the upgrade tool) activates this automatically for new systems
4. Close down remote monitoring and administration via Profile Parameters ms/monitor,
ms/admin_port and ms/server_port_<xx>
(which requires to establish other monitoring and administration procedures)
© 2022
2019-05 SAP SE. All rights reserved. 761
Open items
Other components like Dispatcher, Enqueue Server, RFC Gateway, and ICman offer ACL files,
too
© 2022
2019-05 SAP SE. All rights reserved. 763
What else?
Use the EWA Solution Finder in the SAP Support Portal to view security alerts concerning
the configuration of the RFC Gateway, see topic from 2018-02
© 2022
2019-05 SAP SE. All rights reserved. 765
Pilot Phase for Security Dashboard in the SAP EarlyWatch Alert
Workspace
requested
© 2022
2019-05 SAP SE. All rights reserved. 766
April 2019
Topics April 2019
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2019-04 SAP SE. All rights reserved. 768
SAP Solution Manager Internet Demo System
(EWA, SOS, SysRec, ConfigVal)
SolMan Internet Demo System
https://support.sap.com/en/alm/solution-manager/demo-systems/internet-demo-system.html
Fiori Launchpad
https://www.sapsolutionmanagerdemo.com/sap/bc/ui5_ui5/ui2/ushell/shells/abap/FioriLaunchpad.html
These notes solve an XML External Entity (XXE) vulnerability in SLD Registration program
sldreg.exe
Note 2729710 Version 7 April 2019: Use sldreg.exe from same Kernel patch for Java, too
Both notes are independent, solve different aspects and target all operating systems, i.e.
Windows and Unix/Linux.
ABAP note 2643447 targets developer of custom code, too (case 2d).
Related note with documentation, relevant only if the ABAP application server runs on
Microsoft Windows:
Note 2634476 - Profile parameter abap/path_norm_Windows
© 2022
2019-04 SAP SE. All rights reserved. 771
Do not disable authority objects
auth/object_disabling_active
Mitigation: You cannot suppress authorization checks for authorization objects that belong to Basis
components (starts with S_ ) or to Human Resources (HR) (PLOG or starts with P_ ).
SOS Check “Global Disabling of Authority Checks Is Not Prevented” (0104) recommends
auth/object_disabling_active = N and that table TOBJ_OFF (which you maintain via
transaction AUTH_SWITCH_OBJECTS) is empty.
© 2022
2019-04 SAP SE. All rights reserved. 772
Clickjacking Protection (Reloaded)
Vulnerability synopsis
Attacker‘s Vulnerable
Web-Site Application
HANA
XS www.webapp.com
Clickjacking allows an attacker to manipulate
transaction data like workflow process,
system state or user maintenance steps
JSESSIONID=abc123
<iframe 1 by luring user to perform an interaction with
src="http: the UI.
//www.wepapp.com 3
/acceptWorkflow" http://www.weppapp. This is particularly dangerous when
> com/acceptWorkflow? administrators or privileged business
2 action=approve& user are successfully attacked.
User item=WF0001
➔ Unauthorized transaction execution
interaction
Victim‘s
Web Browser
© 2022
2019-04 SAP SE. All rights reserved. 773
Clickjacking Protection (Reloaded)
Result for ABAP
© 2022
2019-04 SAP SE. All rights reserved. 776
Clickjacking Protection (Reloaded)
Why now? It’s much easier now! (at least for user interfaces based on SAP_UI)
Note 2573569 - UCON HTTP Whitelist Downport (7.40 SP 20, 7.50 SP 12, 7.51 SP 6, 7.52 SP 1)
(February 2018)
Note 2507225 - Integration of Clickjacking Framing Protection with UCON HTTP Whitelist
(April 2018)
Note 2667053 - CX_HTTP_WHITELIST was raised
(July 2018)
Note 2667160 - Activation of client dependent UCON HTTP Whitelist - clickjacking settings are
not saved correctly
(July 2018)
Note 2547381 - CORS integration in UCON HTTP Whitelist and Internet Communication
Framework and and Clickjacking integration in HTTP Whitelist
(October 2018)
Activation:
© 2022
2019-04 SAP SE. All rights reserved. 778
Clickjacking Protection (Reloaded)
Transaction UCON_CHW or UCONCOCKPIT
Example:
© 2022
2019-04 SAP SE. All rights reserved. 779
Clickjacking Protection (Reloaded)
Transaction UCON_CHW or UCONCOCKPIT
© 2022
2019-04 SAP SE. All rights reserved. 780
Clickjacking Protection (Reloaded)
Transaction UCON_CHW or UCONCOCKPIT
Result:
HTTP is blocked
Servers uyt928-er+++
are accepted
© 2022
2019-04 SAP SE. All rights reserved. 781
Clickjacking Protection (Reloaded)
Required actions in a nutshell (in addition to UCON notes)
© 2022
2019-04 SAP SE. All rights reserved. 782
Clickjacking Protection (Reloaded)
References
Online Help
https://help.sap.com/saphelp_nw73ehp1/helpdata/en/96/6b6233e5404ebe80513ae082131132/frames
et.htm
https://help.sap.com/viewer/864321b9b3dd487d94c70f6a007b0397/7.4.19/en-
US/966b6233e5404ebe80513ae082131132.html
© 2022
2019-04 SAP SE. All rights reserved. 783
Clickjacking Protection (Reloaded)
ABAP Framework
UI Framework
Note Note
Note Note Note Note Note
16372871637287
Note Note Note
2573569 2215694 2119535 2207791 1637287 2148130 2299529 1893306
© 2022
2019-04 SAP SE. All rights reserved. 784
Clickjacking Protection (Reloaded)
JAVA Framework
UI Framework
© 2022
2019-04 SAP SE. All rights reserved. 785
March 2019
Topics March 2019
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2019-03 SAP SE. All rights reserved. 787
WINTER IS C𝕆MING - How to keep Connectivity to Support Backbone
SAP's support backbone has been updated. The legacy infrastructure remains in place to allow
a safe transition for customers.
Customers need to switch to the new infrastructure before January 2020 to ensure continuous
connectivity.
This impacts every ABAP-based SAP system which is connected to the support backbone:
➢ All ABAP-based SAP systems which have direct connectivity to SAP (i.e. sending EWA
reports directly to SAP) need to be updated with the latest ST-PI AddOn
Minimum versions: ST-PI 740 SP10, ST-PI 2008_1_700 SP20, ST-PI 2008_1_710 SP20, ST-A/PI 01T* SP01
© 2022
2019-03 SAP SE. All rights reserved. 788
WINTER IS C𝕆MING - How to keep Connectivity to Support Backbone
Note 2714210 - New communication channel to SAP Backbone for Service Content Update
Note 2740667 - RFC connection SAPOSS to SAP Service & Support backbone will change
(latest) in January 2020
[…]
© 2022
2019-03 SAP SE. All rights reserved. 789
Note 2475591 - Transport Check Report
file
Developer At Release:
At Import:
a) Cross Reference c) Cross Release
a) Cross Reference Check
e) Online Import Check e) Online Import Check
b) Sequence Check
c) Cross Release (if relevant)
© 2022
2019-03 SAP SE. All rights reserved. 791
Note 2475591 - Transport Check Report
Transaction /SDF/TRCHECK
= Report /SDF/CMO_TR_CHECK
© 2022
2019-03 SAP SE. All rights reserved. 792
Note 2475591 - Transport Check Report
© 2022
2019-03 SAP SE. All rights reserved. 793
Note 2030144 - Switchable authorization checks for RFC in SLCM
(Student Life cycle Management)
Old note from 2014, but …
© 2022
2019-03 SAP SE. All rights reserved. 794
Note 2524203 - Switchable authorization checks for RFC in FI-CA
… and you already have the software part of the solution as part of a SP upgrade
© 2022
2019-03 SAP SE. All rights reserved. 795
Notes 2764283 2742027 2724713 about XSA
➢ Centrally via …
➢ SAP HANA 2.0 Cockpit ?
➢ SAP Solution Manager
➢ LMDB ?
➢ System Recommendations ?
➢ CCDB and Configuration Validation (Store VERSION of Store Group XSA_STOREGROUP) ?
© 2022
2019-03 SAP SE. All rights reserved. 796
Wiki: Maintenance of Product in the System Landscape
https://wiki.scn.sap.com/wiki/display/SMSETUP/Maintenance+of+Product+in+the+System+Landscape
The Wiki describes how to connect various system types to the SAP Solution Manager
Automatic creation of Technical System?
Automatic entry of installed software?
Application Server ABAP
Application Server Java
SAP HANA: Managed System Setup of SAP HANA in Solution Manager
SAP HANA XSA: SAP HANA XSA System Monitoring setup
SAP BusinessObjects Enterprise: Managed System Setup of BOE 4.X system in Solman 7.1 and 7.2
Web Dispatcher: Configuring Web Dispatcher for Root Cause Analysis in Solution Manager
SAP Router: Managed System Setup of SAP Router in SAP Solution Manager 7.1
© 2022
2019-03 SAP SE. All rights reserved. 797
Overview about recent Notes concerning System Recommendations
Release Notes
Note 2725557 - SysRec: Note type 'License Audit Notes' in System Recommendation as of Solution Manager 7.2 SP 8
Note 2689083 - SysRec: Field "Status" is replaced with "Processing Status" and "Implementation Status" as of SolMan 7.2 SP 7
Correction Notes
Note 2640996 - SysRec: Enhancement of UPL error message Handling
Note 2745082 - SysRec: NonABAP notes relevance check fix
Note 2443137 - SysRec: Note count is 0 in SysRec system overview
Note 2683868 - SysRec: Download Basket doesn't contain the files
Note 2536918 - SysRec: Display all systems and notes at one time
Fiori App Correction Notes
Note 2747922 - SysRec: Corrections for Solution Manager 720 SP 08 Fiori UI
Note 2741223 - SysRec: Corrections for Solution Manager 720 SP 07 Fiori UI
Note 2656937 - SysRec: Collective corrections for SAP Solution Manager 7.2 SP 07 Fiori UI
Note 2556623 - SysRec: Collective Corrections for Solution Manager 720 SP03-SP06 Fiori UI
© 2022
2019-03 SAP SE. All rights reserved. 798
February 2019
Topics February 2019
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2019-02 SAP SE. All rights reserved. 800
SAP Customer Engagement Initiative / Customer Influence
https://influence.sap.com
SAP Customer Engagement Initiative 2019 – Security Registration ends on 16.03.2019
An update of XSA and the underlying SAP HANA system is not required.
(But there is another note this month which requires a joint update.)
Affected is any version below 1.4.3 of component SAP Enterprise Architecture Designer on XSA.
© 2022
2019-02 SAP SE. All rights reserved. 804
Note 2709897 - Directory Traversal in SAP Enterprise Architecture Designer on XSA
> xs login
USERNAME: XSA_ADMIN
PASSWORD>
Authenticating...
> xs lc
© 2022
2019-02 SAP SE. All rights reserved. 805
Note 2750987 - Potential Corruption of Encrypted Root Key
Backups when using SAP HANA Cockpit
Do not use SAP HANA Cockpit 2 to create the root key backup as it could lead to corruption.
Verify existing root key backup files, i.e. if you cannot tell how the backup was created.
Perform root key backups only using the command line as described in the SAP HANA
Administration Guide:
https://help.sap.com/viewer/6b94445c94ae495c83a19646e7c3fd56/2.0.03/en-US/b1e7562e2c704c19bd86f2f9f4feedc4.html
© 2022
2019-02 SAP SE. All rights reserved. 806
Note 2750987 - Potential Corruption of Encrypted Root Key
Backups when using SAP HANA Cockpit
Copy the root key backup file and validate the integrity using the following command
(you will be asked for the root key backup password):
hdbnsutil -validateRootKeysBackup <filename>
If the validation fails, you need to immediately create a new root key backup for your system:
hdbnsutil -backupRootKeys <filename> --dbid=<dbid> | --
database_name=<database_name> --type=ALL
Please note that this command must be executed for SystemDB and every tenant individually.
© 2022
2019-02 SAP SE. All rights reserved. 807
Note 2712210 - SysRec 7.2 SP 5 customize the calculation of
security notes for unused subHR component
Transaction SM30_DNOC_USERCFG_SR
By default SysRec omits notes for unused HR components
© 2022
2019-02 SAP SE. All rights reserved. 808
Note 2712210 - SysRec 7.2 SP 5 customize the calculation of
security notes for unused subHR component
HR Security Notes are rather rare: Just 5 notes have been (re)-published since 2017
It‘s not simple to identify such notes on Support Portal because you cannot select for generic
Software Components SAP_HR* or EA-HR* and you have to enter names one by one.
https://launchpad.support.sap.com/#/mynotes?tab=Search&sortBy=ReleasedOn&f
ilters=releaseStatus%25253Aeq~'NotRestricted'%25252BsecurityPatchDay%25253
Aeq~'NotRestricted'%25252Btype%25253Aeq~'SECU'%25252BfuzzyThreshold%25253A
eq~'0.9'%25252BsoftwareComponent%25253Aeq~'SAP_HR'~'SAP_HRGXX'~'SAP_HRRXX'
~'EA-HR'~'EA-HRGXX'~'EA-HRRXX'~'SAP_HRCDE'~'EA-HRCDE'
© 2022
2019-02 SAP SE. All rights reserved. 809
Note 2712210 - SysRec 7.2 SP 5customize the calculation of
security notes for unused subHR component
Link for SAP_HR, EA-HR plus all 118 components:
https://launchpad.support.sap.com/#/mynotes?tab=Search&sortBy=ReleasedOn&filters=releaseStatus%2
5253Aeq~'NotRestricted'%25252BsecurityPatchDay%25253Aeq~'NotRestricted'%25252Btype%25253Aeq~'SEC
U'%25252BfuzzyThreshold%25253Aeq~'0.9'%25252BsoftwareComponent%25253Aeq~‘SAP_HR'~'SAP_HRCAE'~'SA
P_HRCAR'~'SAP_HRCAT'~'SAP_HRCAU'~'SAP_HRCBE'~'SAP_HRCBG'~'SAP_HRCBR'~'SAP_HRCCA'~'SAP_HRCCH'~'SA
P_HRCCL'~'SAP_HRCCN'~'SAP_HRCCO'~'SAP_HRCCZ'~'SAP_HRCDE'~'SAP_HRCDK'~'SAP_HRCEG'~'SAP_HRCES'~'SA
P_HRCFI'~'SAP_HRCFR'~'SAP_HRCGB'~'SAP_HRCGR'~'SAP_HRCHK'~'SAP_HRCHR'~'SAP_HRCHU'~'SAP_HRCID'~'SA
P_HRCIE'~'SAP_HRCIN'~'SAP_HRCIT'~'SAP_HRCJP'~'SAP_HRCKR'~'SAP_HRCKW'~'SAP_HRCKZ'~'SAP_HRCMX'~'SA
P_HRCMY'~'SAP_HRCNL'~'SAP_HRCNO'~'SAP_HRCNZ'~'SAP_HRCOM'~'SAP_HRCPH'~'SAP_HRCPL'~'SAP_HRCPT'~'SA
P_HRCQA'~'SAP_HRCRO'~'SAP_HRCRU'~'SAP_HRCSA'~'SAP_HRCSE'~'SAP_HRCSG'~'SAP_HRCSI'~'SAP_HRCSK'~'SA
P_HRCTH'~'SAP_HRCTR'~'SAP_HRCTW'~'SAP_HRCUA'~'SAP_HRCUN'~'SAP_HRCUS'~'SAP_HRCVE'~'SAP_HRCZA'~'SA
P_HRGXX'~'SAP_HRRXX'~'EA-HR'~'EA-HRCAE'~'EA-HRCAR'~'EA-HRCAT'~'EA-HRCAU'~'EA-HRCBE'~'EA-
HRCBG'~'EA-HRCBR'~'EA-HRCCA'~'EA-HRCCH'~'EA-HRCCL'~'EA-HRCCN'~'EA-HRCCO'~'EA-HRCCZ'~'EA-
HRCDE'~'EA-HRCDK'~'EA-HRCEG'~'EA-HRCES'~'EA-HRCFI'~'EA-HRCFR'~'EA-HRCGB'~'EA-HRCGR'~'EA-
HRCHK'~'EA-HRCHR'~'EA-HRCHU'~'EA-HRCID'~'EA-HRCIE'~'EA-HRCIN'~'EA-HRCIT'~'EA-HRCJP'~'EA-
HRCKR'~'EA-HRCKW'~'EA-HRCKZ'~'EA-HRCMX'~'EA-HRCMY'~'EA-HRCNL'~'EA-HRCNO'~'EA-HRCNZ'~'EA-
HRCOM'~'EA-HRCPH'~'EA-HRCPL'~'EA-HRCPT'~'EA-HRCQA'~'EA-HRCRO'~'EA-HRCRU'~'EA-HRCSA'~'EA-
HRCSE'~'EA-HRCSG'~'EA-HRCSI'~'EA-HRCSK'~'EA-HRCTH'~'EA-HRCTR'~'EA-HRCTW'~'EA-HRCUA'~'EA-
HRCUN'~'EA-HRCUS'~'EA-HRCVE'~'EA-HRCZA'~'EA-HRGXX'~'EA-HRRXX'
© 2022
2019-02 SAP SE. All rights reserved. 810
Recap: Security Patch Process
➢ System Recommendations
Tool to find the applicability of notes to systems
© 2022
2019-02 SAP SE. All rights reserved. 811
January 2019
Topics January 2019
© 2022
2019-01 SAP SE. All rights reserved. 813
Note 2699233 - Information Disclosure in SAP Financial
Consolidation Cube Designer
Solution: Solution
“… It now introduces an allowlist …” The fix is a change in the configuration
file of the Deployer Service.
It now introduces an allowlist of Financial
Consolidation URLs, configured by a
Cube Designer administrator, which will
Solution options: no longer allow manipulation of the
If you add real entries do not forget to add entries for http and https.
© 2022
2019-01 SAP SE. All rights reserved. 815
Note 2727624 - Information Disclosure in SAP Landscape
Management
This vulnerability affects HANA installations even if the issue is located in a different
component.
1. Implement the referenced SAP Landscape Management Patch LaMa 3.0 SPS09 PL1
2. Delete old activities and log files to remove confidential information about HANA systems
which you have installed via LaMa.
Delete log files once you do not need them any longer. Log and activity data may have been
exported by users. Ensure proper deletion of these exports, too.
3. Ensure the SAP HANA system user is disabled according to the HANA Security Guide
4. Change relevant passwords of system users of tenants and other administration users
© 2022
2019-01 SAP SE. All rights reserved. 816
Note 2696233 - Multiple Vulnerabilities in SAP Cloud Connector
The SAP Cloud Connector opens TLS encrypted communication channels to SAP Cloud
Platform which then can be used by on-premise applications.
The Cloud Connector connects to the SAP Cloud Platform (SCP) via HTTPS and checks if the server
certificate is signed by a valid and trusted CA, however the Common Name is not verified yet.
So far, I do not see a possibility to check the version of the SAP Cloud Connector and the version of the jvm via
application Configuration Validation in the SAP Solution Manager
© 2022
2019-01 SAP SE. All rights reserved. 817
Note 2724788 - Various Vulnerabilities in ADOBE PDFPRINT LIB
You must make sure that TLSv 1.2 is available in your system.
For TLSv 1.2, we recommend that you use at least version 8.4.49 of the CommonCryptoLib
(CCL).
You must also make sure that TLSv 1.2 is included using the values maintained in the profile
parameter ssl/client_ciphersuites.
Example: ssl/client_ciphersuites = 150:PFS:HIGH::EC_P256:HIGH
150 = 2(BEST) + 4(NO_GAP) + 16("blind") + 128(TLSv1.0)
Example: ssl/client_ciphersuites = 918:PFS:HIGH::EC_P256:EC_HIGH
918 = 2(BEST) + 4(NO_GAP) + 16("blind") + 128(TLSv1.0) + 256(TLSv1.1) + 512(TLSv1.2)
BEST + NO_GAP includes all higher versions, too. Therefore it’s not necessary to list them
explicitly.
The technical details are provided in section 7 of SAP Note 510007 (Setting up SSL on Application Server ABAP).
© 2022
2019-01 SAP SE. All rights reserved. 819
Note 2688393 - SI: Deactivation of the protocols TLS 1.0 and TLS 1.1
on 12/31/2018
Value Description
1 "BC"- Option (accept SSL Version 2.0 CLIENT-HELLO / SSLv2Hello for TLSv1.x Handshake)
2 "BEST"- Option (activate highest available TLS protocol version, i.e. TLSv1.2 for CCL 8.4.31+)
4 "NO_GAP"- Option (no gaps between TLS protocol versions; is forced to date)
16 Allow blind sending of a client certificate
32 "Strict protocol version configuration" option--do not automatically enable TLSv1.0
64 SSLv3 (do not use)
128 TLSv1.0 (if the CommonCryptoLib is too old, you cannot disable TLSv1.0, as e.g. with note 2065806)
256 TLSv1.1
512 TLSv1.2
© 2022
2019-01 SAP SE. All rights reserved. 820
Note 2688393 - SI: Deactivation of the protocols TLS 1.0 and TLS 1.1
on 12/31/2018
How-to deactivate TLS 1.0?
Note 2384243 - NetWeaver Application Server: How to configure strict TLS 1.2
Note 2384290 - SapSSL update to facilitate TLSv1.2-only configurations, TLSext SNI for 721+722 clients
ssl/ciphersuites = 801:PFS:HIGH::EC_P256:EC_HIGH
ssl/client_ciphersuites = 816:PFS:HIGH::EC_P256:EC_HIGH
List of tools:
https://www.owasp.org/index.php/Testing_for_Weak_SSL/TLS_Ciphers,_Insufficient_Transport_Layer_Protection_(OTG-CRYPST-001)#Tools
[32] Testing supported Cipher Suites, BEAST and CRIME attacks via TestSSLServer
http://www.bolet.org/TestSSLServer/
© 2022
2019-01 SAP SE. All rights reserved. 821
Note 2688393 - SI: Deactivation of the protocols TLS 1.0 and TLS 1.1
on 12/31/2018
> sapgenpse tlsinfo -c DEFAULT > sapgenpse tlsinfo -c 150:PFS:HIGH::EC_P256:HIGH
© 2022
2019-01 SAP SE. All rights reserved. 822
Note 2688393 - SI: Deactivation of the protocols TLS 1.0 and TLS 1.1
on 12/31/2018
> sapgenpse tlsinfo -c 950:PFS:HIGH::EC_P256:EC_HIGH > sapgenpse tlsinfo -c 816:PFS:HIGH::EC_P256:EC_HIGH
Similar like for HotNews, Performance Notes, or Legal Change Notes you can now identify
relevant notes having the attribute „Relevancy for System Measurement“
aka „License Audit Notes“
Limitation: The Notes Search on SAP Support Portal https://support.sap.com/notes does not show a filter option for such notes
© 2022
2019-01 SAP SE. All rights reserved. 824
What's new in System Recommendations 7.2 SP 8
Support for Notes which are Relevant for System Measurement
You can display the System Measurement and System Measurement ID columns on the SAP
Note Overview screen via the settings button:
Preparation, which only required if you have previously changed the customizing, i.e. to view
correction notes, too.
In this case you have to extend the settings via transaction SM30_DNOC_USERCFG_SR
for table DNOC_USERCFG
SYSREC_NOTE_TYPES HSLPCA
LAW Consolidation
Note 2407507 - LAW 2.0 SDCCN transfer does not work to 7.31
Note 2164594 - LAW 2.0: Falsche Nutzertypen bei Konsolidierung
Note 2112104 - LAW 2.0: Fehlende Sortierfunktion im RFC STATUS
Using authorization object SM_FUNCS for SM_APPL = SYSTEM_REC you now can distinguish
between activity 03 “Display” and 02 “Change” for accessing status and comments.
The check for accessing status and comments does not distinguish between note types.
The template roles SAP_SYSREC_ALL and SAP_SYSREC_DIS are already adjusted accordingly
in SP 7
© 2022
2019-01 SAP SE. All rights reserved. 828
What's new in Configuration Validation 7.2 SP 8
Send Configuration Validation reports via email
Report DIAGCV_SEND_CONFIG_VALIDATION
Target system Target system (mandatory)
Comparison list Comparison list (mandatory)
Config store(s) Configuration stores (multi values)
Email recipients Email recipients (multi values)
Email greeting, body, ending Text (html)
Email subject Text
Show only non-compliant items X (default) show non-compliant only,
‘ ‘ show compliant and non-compliant,
+ show all including ‘item not found’
and ‘additional in target system’
Compliance table header Text (html)
Attachment name File name
Send to SAP inbox - (default) no, X send to sender, too
Attach results to email X (default) results as attachment, ‘ ‘ results inline
Time range (today - days) Number of days (if the query is time dependent)
Send empty validation result X (default) send also email when validation result is empty, ‘ ‘ no mail if empty results
Use Item Description - (default) no, X show weight and item description (instead of store group name column)
© 2022
2019-01 SAP SE. All rights reserved. 829
What's new in Configuration Validation 7.2 SP 8
Send System Recommendations reports via email
Report DIAGCV_SEND_SYSREC
Comparison list Comparison list (mandatory)
Email recipients Email recipients (multi values)
Email greeting, body, ending Text (html)
Email subject Text
Compliance table header Text (html)
Attachment name File name
Send to SAP inbox - (default) no, X send to sender, too
Attach results to email X (default) results as attachment,
‘ ‘ results inline
Release date in (today - days) Number of days
Include HotNews, Security Notes, Performance notes, Legal Change notes, Correction notes
X select note type, ‘ ‘ do not select note type
Report uses on individual columns
- (default) show configuration validation standard report,
X show system recommendation report
© 2022
2019-01 SAP SE. All rights reserved. 831
December 2018
Topics December 2018
Recordings:
DSAG (German)
ASUG
SAP Learning HUB
© 2022
2018-12 SAP SE. All rights reserved. 834
Note 2718993 - Cross-Site Scripting using host header in NetWeaver
AS Java
The note does not describe a software patch but a manual configuration instruction:
Configure appropriate ProxyMappings to disregard the information provided in the request host
header and to avoid HTTP host header manipulation, even if there is no Proxy or Load balancer in
front of the system. For more details see documentation about Mapping Ports and KBA 1927272.
Example:
You have NetWeaver AS Java including ICM installed on host www.local.com and ports 50000 for
http respective 50001 for https.
The Override attribute (with default value false) is activated to force the host and port information from
the request to be overridden by the relevant information from this property.
If you are already using a Proxy, ensure that this attribute is set.
© 2022
2018-12 SAP SE. All rights reserved. 835
Note 2718993 - Cross-Site Scripting using host header in NetWeaver
AS Java
In application Change Reporting
and Configuration Validation,
respective (as shown here) in
transaction CCDB you find the
Configuration Item
ProxyMappings in the
Configuration Store http for
Java systems:
© 2022
2018-12 SAP SE. All rights reserved. 836
Note 2721962 - Version Management: REMOTE comparison option
is missing the "Target sys" option
Remote version comparison requires an RFC destination from DEV to PROD:
SAP landscape A
Development Production
system
! Test system ! system
! !
SAP landscape B
Development ! Production
Test system !
system system
RPY_EXISTENCE_CHECK_FUNC
READ_SOURCE_WITH_ENHANCEMENTS
© 2022
2018-12 SAP SE. All rights reserved. 838
Note 2530147 - Missing Authorization check in DFPS stock transfer
process
The corrections for software component EA-DFPS adds an unconditional authority check for
authority object DF_BAS_ALE in a remote-enabled BAPI function.
This authority check is too strict - it only should be checked in case of an external RFC call.
It is not required for local calls of the function module in the context of IDoc processing.
© 2022
2018-12 SAP SE. All rights reserved. 839
Note 2061129 - Missing whitelist check in SAP Dispute Management
© 2022
2018-12 SAP SE. All rights reserved. 840
RFC Security Optimization Projects Security Whitepaper https://support.sap.com/securitywp
→ SAP Security Recommendations: Securing Remote Function Calls (RFC)
Authorization
S_ICF RFC Security
Authorization
Encryption S_RFC
SNC
ABAP RFC
RFC Gateway Disable RFC
Functions
Access UCON
Control
SECINFO
Switched Authorization
Access Access
Patching Authorization Proposals
Control Control SU24
REGINFO PRXYINFO
Notes SACF
© 2022
2018-12 SAP SE. All rights reserved. 841
Note 2040644 - System Internal Communications Security
Requirement
Requirements:
Solution:
“The usage of this feature is currently limited to pilot customers that have previously contacted SAP. To
patriciate in the pilot phase, open a ticket on the OSS component BC-SEC referring to this OS note.”
→ Go for it – the feature is available for quite a while, SAP just wants to track which customers are
making use of it
Minimum requirement: SAP_BASIS 7.40 SP 8 (11) with Kernel release 742 or higher
© 2022
2018-12 SAP SE. All rights reserved. 844
Note 2040644 - System Internal Communications Security
First steps
➢ SAP_BASIS 7.40 SP 11
© 2022
2018-12 SAP SE. All rights reserved. 845
Note 2040644 - System Internal Communications Security
Check activation
© 2022
2018-12 SAP SE. All rights reserved. 846
Note 2040644 - System Internal Communications Security
Caveats
© 2022
2018-12 SAP SE. All rights reserved. 847
Note 2040644 - System Internal Communications Security
Caveats
Note that after activation, no non-internal tool will be able to access internal components (e.g. enqueue
server) anymore if not secured by TLS and if not taking part in the internal PKI.
3rd party monitoring tools may fail. This is intended.
© 2022
2018-12 SAP SE. All rights reserved. 848
Note 2040644 - System Internal Communications Security
Caveats
If port filters are used directly on instances (system internal firewall), you may want to fixate the
GWs SSL port using instance profile parameter gw/internal_port and allow access to the
specified port in your firewall setup. When gw/internal_port is not set, the gateway will
assign dynamic ports that can change after each system restart (or the restart of the gwrd
process).
© 2022
2018-12 SAP SE. All rights reserved. 849
Note 2040644 - System Internal Communications Security
Conclusion
➢ Best point in time for implementation: After release upgrade, conversions, new installations
Online Documentation: Encrypting Internal Server Communication of SAP NetWeaver AS for ABAP
https://help.sap.com/viewer/e73bba71770e4c0ca5fb2a3c17e8e229/7.4.19/en-
US/41ffb9eb52244e979bf7164f93fe7472.html
© 2022
2018-12 SAP SE. All rights reserved. 850
November 2018
Topics November 2018
© 2022
2018-11 SAP SE. All rights reserved. 856
Security Notes Statistics: ABAP vs. others
© 2022
2018-11 SAP SE. All rights reserved. 857
Security Notes Statistics: ABAP vs. others
© 2022
2018-11 SAP SE. All rights reserved. 858
Spring Framework Vulnerabilities in SAP
Implement the following notes for following products affected by these vulnerabilities:
Note 2681280 - HAN-SDS - Security vulnerability in Spring Framework library used by SAP HANA Streaming
Analytics
Note 2633025 - BC-XS-SEC - Update SAP Client Library 1.25.0
(use latest version 1.28.0 according to note 2710106)
Note 2656951 - CRM-CCI - SAP Contact Center Hotfix 7.0.11.13 Universal Queue: Open Source Vulnerability Fix
Note 2656955 - CRM-CCI - SAP Contact Center Hotfix 7.0.12.16 Universal Queue: Open Source Vulnerability Fix
© 2022
2018-11 SAP SE. All rights reserved. 860
Note 2490973 - Missing Authorization check in SAP SRM
Solution options:
■
□ Change code
□ Invent allowlist,
allowlist manual configuration required
© 2022
2018-11 SAP SE. All rights reserved. 861
Note 1517831 - Potential Directory Traversal in SAP HCM Payroll NPO
No action needed.
The correction was published end of 2010 for SAP_HRCUN release 604 (and 600).
➢ to avoid that the Note Assistant, transaction SNOTE, shows it as ‘can be implemented’
(and when you try to implement the note you would get the message ‘all changes are already
implemented’
© 2022
2018-11 SAP SE. All rights reserved. 862
Notes 2392860 2693083 - Leveraging privileges by customer
transaction code (reloaded)
© 2022
2018-11 SAP SE. All rights reserved. 863
KBA 2709955 - Processor-based vulnerabilities: patch progress by
solution in SAP‘s cloud environments
Meltdown and Spectre are security vulnerabilities that affect most of Intel x86 processors.
The vulnerabilities concern flaws in the CPU architecture, especially caching and speculative
execution, as well as CPU features intended to boost performance.
The KBA shows the status of the patch progress by solution in SAP‘s cloud environments.
© 2022
2018-11 SAP SE. All rights reserved. 864
New Security Audit Log Messages (reloaded)
Notes 2299636 & 2332693 & 2360408 for SE06 and SCC4
All three notes (2299636 to get the messages & 2332693 for SE06 & 2360408 for SCC4) are
required to introduce the following messages for 7.31, 7.40, 7.50:
EU1 Very Critical System changeability changed (&A to &B) in transaction SE06
EU2 Very Critical Client setting for &A changed (&B) in transaction SCC4
© 2022
2018-11 SAP SE. All rights reserved. 865
Note 2258238 - SAP Note Assistant: Troubleshooting Reports
Report SCWN_PREREQUISITE_CALC_SWI
shows which prerequisites notes have been
implemented along with a particular note.
Report SCWN_NOTES_SUCCESSORS_CALC
shows which dependent notes will be
affected if a note needs to be de-
implemented.
© 2022
2018-11 SAP SE. All rights reserved. 867
Note 2258238 - SAP Note Assistant: Troubleshooting Reports
Report SCWN_OBJECT_LIST_CALC_SWI
shows which objects were touched by a
note and what the status are for those
objects.
© 2022
2018-11 SAP SE. All rights reserved. 868
News about Configuration Validation
Fiori based Reporting as of SolMan 7.2 SP 6
© 2022
2018-11 SAP SE. All rights reserved. 869
News about Configuration Validation
Fiori based Reporting as of SolMan 7.2 SP 6
You select a Target
System, a Comparison
List and optionally a
selection for a
Configuration store
© 2022
2018-11 SAP SE. All rights reserved. 870
News about Configuration Validation
Fiori based Reporting as of SolMan 7.2 SP 6
Drilldown into system specific details:
© 2022
2018-11 SAP SE. All rights reserved. 871
How-to create a specific Fiori tile
Create tile in Fiori Launchpad Designer
Start the Launchpad Designer via report /UI2/START_URL
respective transactions /UI2/FLPD_CUST (client-spc.) or /UI2/FLPD_CONF (cross-client)
Enter texts
/sap/bc/ui5_ui5/sap/confana720/index.html?TARGET_ID=<target_system>&
COMPLIST=<comparison_list>&CONFSTORE=<configuration_store>&ADDRESTRI
CTIONS&DATERANGE&sap-client=<client>&sap-language=<language>
© 2022
2018-11 SAP SE. All rights reserved. 873
How-to create a specific Fiori tile
Add tile to group
© 2022
2018-11 SAP SE. All rights reserved. 874
How-to create a specific Fiori tile
Add tile to group
© 2022
2018-11 SAP SE. All rights reserved. 875
October 2018
Topics October 2018
Recordings:
DSAG (German)
ASUG
© 2022
2018-10 SAP SE. All rights reserved. 877
News from Support Portal Launchpad
SAP Notes Dependency Browser
© 2022
2018-10 SAP SE. All rights reserved. 878
News from Support Portal Launchpad
SAP Notes Dependency Browser
© 2022
2018-10 SAP SE. All rights reserved. 879
Note 2699726 - Missing network isolation in Gardener
SAP's outbound Open Source project "Gardener" is a tool for providing Kubernetes clusters on
various cloud providers. You can find more information about project "Gardener" in the
Kubernetes Blog https://kubernetes.io/blog/2018/05/17/gardener/ .
At SAP we consume project "Gardener" as well inbound already for providing Kubernetes
clusters for several SAP products which are in a beta shipment phase like SAP Cloud Platform
Continuous Integration and Delivery (indirect shipment).
The Gardener Core Team at SAP is responsible for all (security) updates of all Gardener
instances and all Gardener managed Kubernetes clusters in the above-mentioned context. But
because Gardener is an Open Source project and the SAP ecosystem is large, the Gardener
Core Team at SAP decided to not only inform the Gardener Open Source Community directly
but as well in general via this SAP security note.
No software component
can be assigned:
© 2022
2018-10 SAP SE. All rights reserved. 880
Note 2392860 - Leveraging privileges by customer transaction code
© 2022
2018-10 SAP SE. All rights reserved. 881
Support Connection using Local FireFighter
Draft proposal for ticket notification (Prio: Very High, Source: Accounts):
This ticket refers to the production system, however, you cannot logon directly but you have to use
the FireFighter process:
1. Logon to the system using the support user and call transaction /n/GRCPI/GRIA_EAM, choose
a free entry and logon via the FireFighter to the system.
2. Enter the reason code <code> and add the incident number / service order into the text field.
3. Describe briefly the indented actions and confirm the popup to logon to the production system.
4. Do not forget to logoff from the production system as well as from the FireFighter transaction
after you have finished your work.
© 2022
2018-10 SAP SE. All rights reserved. 883
Support Connection using Central FireFighter
Ensure that the system names shown in the central system match to the names of the
referenced production systems.
Example: P00CLNT400 for system P00 with client 400
© 2022
2018-10 SAP SE. All rights reserved. 884
Support Connection using Central FireFighter
Draft proposal for ticket notification (Prio: Very High, Source: Accounts):
This ticket refers to the production system, however, you cannot logon directly but you have to use
the Central FireFighter system <FFF>:
1. Use the Secure Area to retrieve logon data for system <FFF> with installation number
<nnnnnnnnnn>.
2. Search for open connections [via STFK] for system <FFF> with installation number
<nnnnnnnnnn> of customer number <cccccc> and logon to that system.
3. Within system <FFF> call transaction GRAC_EAM, choose a free entry targeting the production
client and connect to the system.
4. Enter the reason code <code> and add the incident number / service order into the text field.
5. Describe briefly the indented actions and confirm the popup to logon to the production system.
6. Check using the SAPGUI status bar that you have reached the correct system and client.
7. Do not forget to logoff from the production system as well as from the FireFighter transaction
after you have finished your work.
© 2022
2018-10 SAP SE. All rights reserved. 885
Note 2442227 - Simulation of authorization checks
© 2022
2018-10 SAP SE. All rights reserved. 886
Note 2442227 - Simulation of authorization checks
Prerequisites:
You have activated profile parameter auth/auth_user_trace and transaction STUSERTRACE
You have recorded authorization checks using the user trace
Analysis:
Using transaction STSIMAUTHCHECK (= report RSUSR_SUAUTHVALTRC_SIMU), you can check for a
selection of users whether the recorded authorization checks would run successfully with their current
authorizations or not. In this simulation, either all authorizations of the users or just individual roles
assigned to the users can be taken into account. The trace data can be read from the local system or
from a remote system.
Usage:
For example, you can check the effects of a new role concept by comparing the result of the simulation
in a role development system with the result of the authorization check from the user trace in the test
or production system.
© 2022
2018-10 SAP SE. All rights reserved. 887
Note 2442227 - Simulation of authorization checks
© 2022
2018-10 SAP SE. All rights reserved. 888
Note 2442227 - Simulation of authorization checks
© 2022
2018-10 SAP SE. All rights reserved. 889
Note 2442227 - Simulation of authorization checks
© 2022
2018-10 SAP SE. All rights reserved. 890
Note 2442227 - Simulation of authorization checks
© 2022
2018-10 SAP SE. All rights reserved. 891
System Recommendations 7.2 SP 7 - How to find updated notes
© 2022
2018-10 SAP SE. All rights reserved. 892
System Recommendations 7.2 SP 7 - How to find updated notes
© 2022
2018-10 SAP SE. All rights reserved. 893
System Recommendations 7.2 SP 7 - How to find updated notes
© 2022
2018-10 SAP SE. All rights reserved. 894
System Recommendations 7.2 SP 7 - How to find updated notes
Create a specific filter for updated (security) notes and save it as a tile into a suitable Fiori
Launchpad Group:
© 2022
2018-10 SAP SE. All rights reserved. 895
September 2018
Topics September 2018
Recordings:
DSAG (German)
ASUG
© 2022
2018-09 SAP SE. All rights reserved. 897
Note 2585923 - CUA: Text comparison (callback whitelist)
The CUA uses RFC callback as part of function “text comparison” which loads authorization
profile names, role names and license options into the CUA main system.
© 2022
2018-09 SAP SE. All rights reserved. 898
Note 1640584 - Missing authorization check for maintenance of trust
https://launchpad.support.sap.com/#/softwarecenter/search/SAPKB73117
© 2022
2018-09 SAP SE. All rights reserved. 899
Note 2644279 - Missing XML Validation vulnerability in BEx Web
Java Runtime Export Web Service
You will see this note for such Java systems even
after patching because the note does not contain
references to SP or patches containing the
solution. (Tell SAP if you do not get the note at all.)
© 2022
2018-09 SAP SE. All rights reserved. 900
Notes 2522156 and 2508918 - SAL | New events for UCON_HTTP
whitelists (7.40) and CDS views (7.50)
Implement notes 2522156, 2508918, 2573779, 2573792 (to activate usage of the messages) and
Implement notes 2463645, 2682603 (to get the definition and view of the messages).
New transactions SM01_DEV and SM01_CUS replace good old transaction SM01
Install recent notes (which include prerequisite notes), too: 2367061, 2420609, 2422243, 2578158
© 2022
2018-09 SAP SE. All rights reserved. 902
SAProuter
You find SAProuter Security Notes like all other Security Notes on
https://support.sap.com/notes with Document type = SAP Security Notes
Let’s assume we can find the name SAPROUTER in the short text of basis notes – but as there
might be written as SAP ROUTER let’s search for “router” giving following result:
Note 2622434 - Information disclosure relating to password in SAProuter 10.07.2018
Note 2037492 - Potential denial of service in SAP Router 14.10.2014
Note 1986895 - Potential disclosure of information in SAProuter 08.04.2014
Note 1853140 - Managing SAProuter from external host 12.11.2013
Note 1820666 - Potential remote code execution in SAProuter 08.05.2013
Note 1663732 - Potential information disclosure relating to SAProuter 03.08.2012
You get the same list if you search for application component BC-CST-NI
© 2022
2018-09 SAP SE. All rights reserved. 903
SAProuter
Let’s double-check this list using https://support.sap.com/notes and search for recent notes of
application component BC-CST-NI
Among several functional corrections you find some more normal notes about the SAProuter
which touch security as well:
Note 2126550 - Saprouter crashes with active SNC trace when the saprouter trace file is renamed
04.02.2015
Note 2046942 - Support encrypted passwords in saprouttab
25.07.2014
Note 2106963 - Saprouter over SNC doesn't work with CommonCryptoLib due to oversized initial SNC
token 23.01.2015
© 2022
2018-09 SAP SE. All rights reserved. 904
SAProuter
The application System Recommendations in the Solution Manager is great to find relevant
notes for
• ABAP,
• Kernel disp+work,
• Java,
• HANA
• and some other products
© 2022
2018-09 SAP SE. All rights reserved. 905
SAProuter
Tutorial:
Getting Started with SAProuter - Tutorials
Best practice:
http://scn.sap.com/community/security/blog/2013/11/13/security-of-the-saprouter
Recommended activities:
SAP recommends to upgrade any (active) SAProuter installation as soon as possible
Use an access control list (saprouttab) to limit connectivity
Activate SNC to encrypt the communication channel to SAP support and to block any other connections from
the internet or use hardware encryption using IPSEC
Integrate the SAProuter into a firewall
Use an SAProuter password for SAP Support (and define process how to change it)
(Change the default port)
© 2022
2018-09 SAP SE. All rights reserved. 906
Note 2622434 - Information disclosure relating to password in
SAProuter
saprouttab:
P * host2 3299 mypass P host1 host3 3298
Recordings:
DSAG (German)
ASUG
© 2022
2018-08 SAP SE. All rights reserved. 909
Change Diagnostics @ Support Portal
➢ Change Reporting
➢ Change Analysis / Product Instance
➢ Change Analysis / Systems
➢ Configuration Validation
➢ Configuration Validation / Reporting
© 2022
2018-08 SAP SE. All rights reserved. 910
Validate version of CommonCryptoLib
The CommonCryptoLib shows a specific version number which is a text which contains the version
information and a date.
Examples:
8.5.9 Feb 8 2017
8.5.13 May 2017
8.5.22 Jul 25 2018
You cannot use the > or >= operator to validate the version using application Configuration Validation
for Configuration Store CRYPTOLIB with Configuration Item CCL.
Solution: Use a Regular expression to analyze the digits
Example according to note 2444321 which asks for 8.5.10 or higher:
^(8\.5\.\d{2,}|8\.[6789]\.\d+|8\.\d{2,}\.\d+|9\.\d+\.\d+|\d{2,}\.\d+\.\d+)[ ].*
© 2022
2018-08 SAP SE. All rights reserved. 911
Validate version of CommonCryptoLib
Result:
See
https://wiki.scn.sap.com/wiki/display/TechOps/ConfVal_CommonCryptoLib
© 2022
2018-08 SAP SE. All rights reserved. 912
Note 2546807 - List of Diagnostic Agents can’t be retrieved due to
enforced security at API level
Security Note 2546807 (valid for ST 720) refers to Normal Note 2544779 (valid for ST 720 SP 6)
→ System Recommendations shows Security Note 2546807 always for all SolMan 7.2
installations.
© 2022
2018-08 SAP SE. All rights reserved. 913
Secure Diagnostics Agent
Connect the Diagnostics Agents via P4S (Transport Layer Encryption with or without
Authentication) instead of P4.
➢ Upgrade SAP JVM as described in Wiki how to upgrade a SAP JVM 6.1 or 8.1 for the
Diagnostics Agent
➢ Configure the P4S port for the J2EE NetWeaver Application Server according to Note
2419031
© 2022
2018-08 SAP SE. All rights reserved. 914
Note 2614229 - Memory Corruption vulnerability in SAP
BusinessObjects Business Intelligence platform
Credits:
ERP Applications Under Fire: How cyberattackers target the crown jewels
https://www.onapsis.com/research/reports/erp-security-threat-report
© 2022
2018-08 SAP SE. All rights reserved. 915
Note 2614229 - Memory Corruption vulnerability in SAP
BusinessObjects Business Intelligence platform
Several Notes for Software Component ENTERPRISE respective SBOP BI PLATFORM
SERVERS
➢ Go for an update according to note 2614229 which shows the highest SP/patch levels
Note 2407193 Note 2412999 Note 2630018 Note 2633846 Note 2644154 Note 2614229
© 2022
2018-08 SAP SE. All rights reserved. 916
Note 2671160 - Missing input validation in ABAP Change and
Transport System (CTS)
The extension is part of a Kernel (R3trans) update:
721 patch 1112/1119, 722 patch 625/715, 745 patch 810/824, 749 patch 521/615,
753 patch 220/312, 773 patch 11/25, 774 patch -/12
(use the higher patch level to get an additional functional correction)
Credits:
https://blog.virtualforge.com/en/how-to-double-your-salary-in-1-minute
© 2022
2018-08 SAP SE. All rights reserved. 917
Note 2671160 - Missing input validation in ABAP Change and
Transport System (CTS)
© 2022
2018-08 SAP SE. All rights reserved. 918
Note 2671160 - Missing input validation in ABAP Change and
Transport System (CTS)
Configuration
Validation shows
“Item not found”
if parameter is not
set.
© 2022
2018-08 SAP SE. All rights reserved. 919
Note 2671160 - Mitigation (without solving the issue)
Option a) Checking Critical Objects in Transport Requests
see
© 2022
2018-08 SAP SE. All rights reserved. 920
Note 2671160 - Mitigation (without solving the issue)
Option b) Critical Objects Check and Approval in ChaRM
See
© 2022
2018-08 SAP SE. All rights reserved. 921
Note 2671160 - Mitigation (without solving the issue)
Option c) Approving or Rejecting Requests (Quality Assurance)
Check requests in the QA system before they are delivered to subsequent systems
See
© 2022
2018-08 SAP SE. All rights reserved. 922
Note 2671160 - Mitigation (without solving the issue)
Option d) Quality Gate Management in SAP Solution Manager
Quality gate management (QGM) provides an integrated and consistent quality process for managing
changes and their deployment.
See
© 2022
2018-08 SAP SE. All rights reserved. 923
Security Baseline Template ConfigVal Package version 1.9_CV-5
© 2022
2018-08 SAP SE. All rights reserved. 924
July 2018
No Webinar in June
Topics July 2018
Note 2556623 - SysRec: Collective Corrections for Solution Manager 720 SP03-SP06 Fiori UI
Corrections for System Recommendations 720 Fiori UI version 1.5.22 (no change concerning calculation results):
9. …
10. In Object List you export as CSV file but the field 'Usage count' is not getting exported.
In Filter Definition date change issue in date picker.
© 2022
2018-07 SAP SE. All rights reserved. 927
System Recommendations 7.2 SP 7
Separation between “Implementation Status” and “Processing Status”
© 2022
2018-07 SAP SE. All rights reserved. 928
System Recommendations 7.2 SP 7
Separation between “Implementation Status” and “Processing Status”
User-defined Status
SAP Status
Customizing table
(fixed values) AGSNOTE_STATUS
© 2022
2018-07 SAP SE. All rights reserved. 929
System Recommendations 7.2 SP 7
New column “Support Package containing the solution” for ABAP notes
© 2022
2018-07 SAP SE. All rights reserved. 930
System Recommendations 7.2 SP 7
New columns
© 2022
2018-07 SAP SE. All rights reserved. 931
System Recommendations 7.2 SP 7
Online Help
© 2022
2018-07 SAP SE. All rights reserved. 932
Trusted RFC – Whom should a SAP Solution Manager trust?
Only following scenarios requires that the SAP Solution Manager trust a very specific managed
system:
➢ Retrofit-Configuration
A very specific system needs to be trusted by the SAP Solution Manager
Never activate the checkbox on the right side at “Trusted RFC Destination to SAP Solution
Manager” during SolMan Setup - Managed System Configuration:
Take it serious!
© 2022
2018-07 SAP SE. All rights reserved. 934
Note 2644227 - Command execution with SAP Internet Graphics
Server (IGS) request through the multiplexer RFC listener
Consulting note describing manual configuration:
Transaction SMGW → Goto → Expert Functions → External Security → Maintain ACL Files
Create an reginfo entry for the SAP Internet Graphics Server (IGS) with the following arguments:
P TP=IGS.<SID> HOST=local CANCEL=local ACCESS=local
or
P TP=IGS.<SID> HOST=local CANCEL=local ACCESS=internal
© 2022
2018-07 SAP SE. All rights reserved. 935
Note 2644227 - Command execution with SAP Internet Graphics
Server (IGS) request through the multiplexer RFC listener
© 2022
2018-07 SAP SE. All rights reserved. 936
Note 2621121 - Information Disclosure in UI5 Handler
Application Component CA-UI5-DLV
© 2022
2018-07 SAP SE. All rights reserved. 937
Note 2538856 - Cross-Site Scripting (XSS) vulnerability in SAPUI5
Application Component CA-UI5-CTR-ROD
© 2022
2018-07 SAP SE. All rights reserved. 939
Note 2110950 - Potential disclosure of persisted data in ST
→ Nothing to do for
customers Mark all entries
Note is “Independent”
© 2022
2018-07 SAP SE. All rights reserved. 941
New Security Audit Log Messages
Notes 2299636 & 2332693 & 2360408 for SE06 and SCC4
All three notes (2299636 to get the messages & 2332693 for SE06 & 2360408 for SCC4) are
required to introduce the following messages for 7.31, 7.40, 7.50:
EU1 Very Critical System changeability changed (&A to &B) in transaction SE06
EU2 Very Critical Client setting for &A changed (&B) in transaction SCC4
© 2022
2018-07 SAP SE. All rights reserved. 942
New Security Audit Log Messages
Note 2535552 - SCU3: New authorization design for table logging
Note 2535552
Database table
DB RSAU_BUF_DATA
SAP Enterprise
Thread Detection
Program
Program
SAL SAL files per
Transaction Interface Files application server DB
ODATA
Transaction
RFC Function RSAU_COLLECT_STAT_DATA
Statistical data in tables
© 2022
2018-07 SAP SE. All rights reserved. 944
Security Audit Log as of SAP_BASIS 7.50
Maintenance
▪ = report RSAU_FILE_ADMIN
▪ Configure integrity protection
▪ Check integrity protection
▪ Reorganization of log files
▪ Reorganization of log events in database using archiving object BC_SAL
➢ Transaction RSAU_CONFIG - Configuration SM19
▪ = report RSAU_CONFIG_MAINT
▪ Maintain Kernel parameters
▪ Maintain dynamic configuration / filters
▪ Maintain static configuration / filters
➢ Transaction RSAU_TRANSFER - Download/Upload Configuration Data
▪ = report RSAU_TRANSFER
▪ Download/Upload Configuration Data
© 2022
2018-07 SAP SE. All rights reserved. 946
Security Audit Log as of SAP_BASIS 7.50
Show
Once you maintain Kernel Parameters you get a warning after next restart of the server:
Filters
Up to 90 filers are available, you can transport or download/upload filter definitions
Filters for Audit Classes cover new events automatically
Filters for individual event messages should be analyzed if some new messages should be activated, too
Decide how to store log for audit purpose in the future
Complete files
Extracts
Data retention periods
© 2022
2018-07 SAP SE. All rights reserved. 948
Security Audit Log as of SAP_BASIS 7.50
Links
Analysis and Recommended Settings of the Security Audit Log (SM19 / SM20)
https://blogs.sap.com/2014/12/11/analysis-and-recommended-settings-of-the-security-audit-log-sm19-sm20/
Note 2191612 - FAQ | Use of Security Audit Log as of SAP NetWeaver 7.50
© 2022
2018-07 SAP SE. All rights reserved. 949
May 2018
Topics May 2018
Recordings:
DSAG (German)
ASUG
© 2022
2018-05 SAP SE. All rights reserved. 951
Note 2524107 - AIS | Enhancements in system audit reporting
© 2022
2018-05 SAP SE. All rights reserved. 952
Note 2524107 - AIS | Enhancements in system audit reporting
© 2022
2018-05 SAP SE. All rights reserved. 953
Note 2524107 - AIS | Enhancements in system audit reporting
© 2022
2018-05 SAP SE. All rights reserved. 954
SAP Solution Manager User Management Transaction USR_MNGT
Checks / Actions:
➢ Do you need all these existing users, i.e. do you need “template users”?
➢ Does the user type match to the purpose of the user and your security policy?
Use transaction SE16 to create (empty) entries in table HTTP_WHITELIST for entry types 10, 11
(and maybe some more) to block cross-domain redirection.
01 HTTP Framework to filter for valid URLs (Note 853878)
02 Exit URL for parameter sap-exiturl
03 NWBC runtime
10 WebDynpro Resume URL (Note 2081029)
11 Web Dynpro Redirect URL (Note 2081029)
20 Redirect URL for parameter sap-mysapred of ICF (Note 612670)
21 Redirect URL for parameter redirectURL of ICF (Note 1509851)
30 Clickjacking Framing Protection (Note 2142551)
40 Suite Redirect
99 Redirect (generic)
You can use report RS_HTTP_WHITELIST instead, too, which shows the value help for the
entry type field.
© 2022
2018-05 SAP SE. All rights reserved. 956
Note 2449757 - Additional Authentication check in Trusted RFC on
own system (reloaded)
Caution: Use Kernel update as described in note 2614667 before activating parameter
rfc/selftrust in systems where you want to define Trusted RFC destinations within the
same system.
© 2022
2018-05 SAP SE. All rights reserved. 957
Note 2610231 - Code Injection Vulnerability in SAP MaxDB ODBC
Driver
For comparison:
This note is about client software, not about You see the server version at System → Status:
the server part of the database.
© 2022
2018-05 SAP SE. All rights reserved. 959
Recommended Notes for System Recommendations
Note 2590592 - SysRec7.2 NonABAP system notes calculation (new version available)
© 2022
2018-05 SAP SE. All rights reserved. 960
Recommended Notes for System Recommendations
Note 2556623 - SysRec: Collective Corrections for Solution Manager 720 SP03-SP06 Fiori UI
Corrections for System Recommendations 720 Fiori UI version 1.5.21 (no change concerning calculation results):
1. In Note Overview you have saved search criteria as variant, after you re-enter System Recommendations the saved variant
is not available.
2. In System Overview and Note Overview by default 20 items are loaded at one time, you need to keep on scrolling down the
mouse to see more items. You want to load all items at one time.
3. When selecting technical system in Note Overview the dropdown list for technical systems does not show all values if there
are more than 100 systems available. This list contains only 100 entries which are sorted alphabetically and after the 100th it
is truncated.
4. In Note Overview you mark several notes and click button Actions-Change Status to set notes status, only the Status ID of
the first note is updated.
5. The title of table in Note Overview is "System with SAP Notes (number)", it should read "SAP Notes for selected technical
system: number".
6. In Note Overview you set the note status for a note, the comment entered for the last note appears in the comment textbox.
7. In Note Overview you execute a self-defined variant, "No data" is displayed in Note List.
8. In Note Overview you select the date range, after clicking on Go button, the dates automatically change to different values.
9. When you display a large number (>1000) of notes in Note Overview, you observe that the performance is low.
© 2022
2018-05 SAP SE. All rights reserved. 961
Note 2556623 - SysRec: Collective Corrections for Solution Manager
720 SP03-SP06 Fiori UI
Preparation to avoid error "No license to edit object R3TR WAPA SM_CM_SYSREC“:
Call transaction SE80 for package
UISM_AGS_SYSREC_UI.
© 2022
2018-05 SAP SE. All rights reserved. 962
Note 2556623 - SysRec: Collective Corrections for Solution Manager
720 SP03-SP06 Fiori UI
Create a workbench transport.
© 2022
2018-04 SAP SE. All rights reserved. 966
Switchable authorization checks (SACF)
222 Notes in total (most have a part for SNOTE as well as a manual installation instruction)
SAP Update Manager (SUM) informs you after system updates to run transaction SACF_COMPARE to
activate switchable authorization checks required by your business processes.
© 2022
2018-04 SAP SE. All rights reserved. 967
SACF Maintain productive scenarios of Switchable Authorizations
© 2022
2018-04 SAP SE. All rights reserved. 968
SACF_COMPARE Compare Active Scenarios for Switchable
Authorizations
Compare Active Scenarios for Switchable Authorizations
Switchable authorization scenarios are provided by software vendors and need to be stored in the local system landscape as active scenarios. Only the active scenarios
affect the process of an authorization check.
To support the initial configuration and the later (modification) comparison of scenarios, the following comparison scenarios are available with transaction SACF_COMPARE:
(The comparison is started in simulation mode. Changes must be started from the results list.)
➢ Set Initial Values of Active Scenarios
This step allows you to perform the initial configuration of the active scenarios. The comparison starts with an analysis of the objects to be adjusted. Starting from this
list, initial values are set for the comparable scenarios selected in the list.
➢ Automatic Comparison of Active Scenarios
The automatic comparison starts with an analysis of the objects to be adjusted. The automatic comparison is performed, starting from this list. All differences between
the scenario definition and the active scenario where the difference in the active data record of the active scenario is not based on a manual change can be compared
automatically.
➢ Manual Comparison of Active Scenarios
If there are differences between manually-adjusted data for active scenarios and the associated scenario definitions, you can use this processing option to identify and
edit them.
➢ Consistency Check
This option allows you to check scenarios in active use with regard to the completeness of secure usage. This option does not have a change mode.
Notes
Additional Comparison Option: Individual Maintenance Using Transaction SACF (In the Maintenance Dialog of a Scenario Definition)
Since active scenarios can also run in local system landscapes in "learning mode", it is not possible to assign a status with a characteristic such as "Comparison finalized",
"Checked", and so on. However, you can use the time stamp of the last change to check the comparison.
© 2022
2018-04 SAP SE. All rights reserved. 969
Switchable authorization checks (SACF)
© 2022
2018-04 SAP SE. All rights reserved. 970
Proposal for Security Optimization during normal operations
1. Activate Security Audit Log (if not done already) i.e. for messages DUO DUP DUQ DUU DUV
2. Optional: Implement missing Security Notes listed in application System Recommendations
and other normal notes about SACF (use the Expert Search in the SAP Support Portal)
➢ But you may decide to skip SACF notes to avoid to implement manual instructions.
3. Activate all SACF scenarios in transaction SACF_COMPARE and transport them to PRD
Scenario status L (logging), SAL Status A (all)
This has no effect on existing business processes.
4. Repeat weekly:
a. Analyze logs and adjust roles if necessary (Messages DUP DUV)
b. Change Scenario status to A (active) for
➢ Scenarios which are not in use (no log entries)
➢ Scenarios which are in use and users have required authorizations (Messages DUO DUU)
5. Later you can reduce the SAL Status to E (error)
2018-04 SAP SE. All rights reserved.
© 2022 971
Proposal for Security Optimization during Support Package update
1. Activate Security Audit Log (if not done already) i.e. for messages DUO DUP DUQ DUU DUV
2. Run technical Support Package update
3. Implement newer Security Notes listed in application System Recommendations and other
normal notes about SACF (use the Expert Search in the SAP Support Portal)
➢ But you may decide to skip SACF notes to avoid to implement manual instructions.
4. Activate all SACF scenarios in transaction SACF_COMPARE and transport them to TST
Scenario status A (active), SAL Status A (all)
Missing authorizations lead to errors in existing business processes.
5. Perform regular complete application and acceptance testing
6. Analyze logs and adjust roles if necessary (Messages DUP DUV)
7. Go live with strong security settings
8. Later you can reduce the SAL Status to E (error)
Transaction SACF and SACF_COMPARE do not know the scenario even in a higher Support
Package level.
To solve this issue it is necessary to upload the attachment from note 2272827 via transaction
SACF_TRANSFER into the development system. The scenario gets registered on a transport
which you can use to transport it to the production system.
© 2022
2018-04 SAP SE. All rights reserved. 973
Note 184277 - Length Limitation of SNC-Names
Note 2562127 - R/3 Support Remote Connection with SNC / SSO
Note 184277 describes limitations concerning the maximal length of printable SNC names.
For all relevant (= actively used) SAP_BASIS and Kernel releases it tells:
➢ Hard Limit: Release >= 6xx R/3 Kernel 254 8-bit chars for the printable name
➢ Warning: Do NOT use SNC-Names that are longer than 220 printable characters with
SAP Netweaver >= 6xx.
Note 2562127 describes an additional temporary limitation concerning the SNC names of
APAP application servers if you want to use the SNC / SSO secured Support Remote
Connection
➢ Please take into account, that at this point in time we DO NOT support SNC names with a length
bigger than 80 characters. This feature will be delivered by June 2018.
© 2022
2018-04 SAP SE. All rights reserved. 974
Note 2614141 - Improper session management when using
SAP Cloud Connector
© 2022
2018-04 SAP SE. All rights reserved. 975
Note 2614141 - Improper session management when using
SAP Cloud Connector
➢ Java JRE
check version ≥ 1.8.0_162
(which match to Oracle JDK
Update 8u162)
© 2022
2018-04 SAP SE. All rights reserved. 976
Note 2614141 - Improper session management when using
SAP Cloud Connector
➢ Java JVM
check version ≥ 8.1.036
or date ≥ 09.02.2018
© 2022
2018-04 SAP SE. All rights reserved. 977
Note 2614141 - Improper session management when using
SAP Cloud Connector
Check the security status:
▪ Both the general and the subaccount-
specific security status are aggregated
on the top
▪ The ”General Security Status” addresses
security topics of the current installation
that are subaccount-independent
▪ The ”Subaccount-Specific Security
Status” lists security-related information
for each subaccount.
▪ The service user is specific to the Windows
Operating System and is only visible when
running the Cloud Connector on Windows.
It cannot be addressed through the UI.
Note: The security status is for informational purposes only and merely
serves as a reminder to address security issues or as confirmation that your
installation complies with all recommended security settings.
© 2022
2018-04 SAP SE. All rights reserved. 978
Note 2614141 - Improper session management when using
SAP Cloud Connector
2. Install a Failover Instance for High Availability (if not done already)
https://help.sap.com/viewer/cca91383641e40ffbe03bdc78f00f681/Cloud/en-US/c697705179a24d2b8b6be038fae59c33.html
© 2022
2018-04 SAP SE. All rights reserved. 979
Note 2622660 - Security updates for web browser controls delivered
with SAP Business Client
Internet Explorer: Security corrections for .NET framework are delivered via Microsoft Update.
Chromium: The full browser control is delivered with SAP Business Client, security corrections for this
browser control are shipped with SAP Business Client patches.
© 2022
2018-04 SAP SE. All rights reserved. 980
Note 2622660 - Security updates for web browser controls delivered
with SAP Business Client
The user decides which browser engine, Internet Explorer respective Chromium, is used:
Inspect more settings in these files in sections <WebbrowserFeatures> (for Internet Explorer)
respective <ChromiumSettings>
© 2022
2018-04 SAP SE. All rights reserved. 981
Note 2622660 - Security updates for web browser controls delivered
with SAP Business Client
Related Note 2446515 - SAP Business Client 6.5: Prerequisites and restrictions
© 2022
2018-04 SAP SE. All rights reserved. 982
Note 2190621 - SAP Netweaver SAL incorrect logging of addresses
rsau/log_peer_address = 1
© 2022
2018-04 SAP SE. All rights reserved. 983
Note 2497000 - Missing Authorization check in XX-CSC-BR-NFEIN
Note 2497027 - Missing Authorization check in XX-CSC-BR-NFE
However, as usual we recommend to update all installed software, independently if you are
using it or not.
If you are using this component, another legal change note 2477513 (which automatically implements
notes 2497027, 2368483, too) should be implemented as well.
© 2022
2018-04 SAP SE. All rights reserved. 984
System Hardening with SAP Security Notes
SAP S/4HANA comes with stronger security by default, however, you should implement some
additional basic security configuration settings.
These Security Notes are relevant for other ECC installations as well.
© 2022
2018-04 SAP SE. All rights reserved. 985
System Hardening with SAP Security Notes
© 2022
2018-04 SAP SE. All rights reserved. 988
March 2018
Topics March 2018
Recordings:
DSAG (German)
ASUG
© 2022
2018-03 SAP SE. All rights reserved. 990
New old notes
Released
SAP Component Number Version Title Category Priority
On
Potential disclosure of persisted data in SV-SMG- Correction with
SV-SMG-DVM 2051336 4 Program error 13.03.2018
DVM medium priority
Missing authorization check in function modules Correction with
BW-SYS-DB-DB4 1974016 2 Program error 15.02.2018
of BW-SYS-DB-DB4 medium priority
Potential disclosure of persisted data in XX-CSC- Correction with
XX-CSC-RU-FI 1906841 1 Program error 13.03.2018
RU medium priority
Unauthorized modification of displayed content in Correction with
CRM-ANA-PS 1696317 2 Program error 27.02.2018
CRM-ANA-PS medium priority
© 2022
2018-03 SAP SE. All rights reserved. 991
Note 2597543 - Directory Traversal vulnerability in SAPCAR
Caution: Use Kernel update as described in note 2614667 before activating parameter
rfc/selftrust in systems where you want to define Trusted RFC destinations within the
same system.
© 2022
2018-03 SAP SE. All rights reserved. 993
Dashboard Builder for Configuration Validation
KPI Catalog
https://go.support.sap.com/kpicatalog
SAP Security Baseline Template Version 1.9 (including ConfigVal Package version 1.9_CV-4)
https://support.sap.com/content/dam/support/en_us/library/ssp/offerings-and-programs/support-services/sap-security-
optimization-services-portfolio/Security_Baseline_Template.zip
© 2022
2018-03 SAP SE. All rights reserved. 994
Dashboard Builder for Configuration Validation
Dashboard
© 2022
2018-03 SAP SE. All rights reserved. 995
Dashboard Builder for Configuration Validation
Example: Overview
© 2022
2018-03 SAP SE. All rights reserved. 996
Dashboard Builder for Configuration Validation
Example: Details
© 2022
2018-03 SAP SE. All rights reserved. 997
Dashboard Builder for Configuration Validation
Example: Definition of Dashboard
© 2022
2018-03 SAP SE. All rights reserved. 998
Dashboard Builder for Configuration Validation
Example: Definition of Dashboard KPIs
Password
Policy (ABAP)
Password
Details
Policy (ABAP)
[…]
© 2022
2018-03 SAP SE. All rights reserved. 999
Dashboard Builder for Configuration Validation
Example: Definition of KPI
© 2022
2018-03 SAP SE. All rights reserved. 1001
Dashboard Builder for Configuration Validation
Example Note 2562089 : Edit Target System
© 2022
2018-03 SAP SE. All rights reserved. 1002
Dashboard Builder for Configuration Validation
Example Note 2562089 : Edit Target System
© 2022
2018-03 SAP SE. All rights reserved. 1003
Dashboard Builder for Configuration Validation
Example Note 2562089 : Reporting
© 2022
2018-03 SAP SE. All rights reserved. 1004
Dashboard Builder for Configuration Validation
Example Note 2562089 : Definition of corresponding Dashbord Tile
© 2022
2018-03 SAP SE. All rights reserved. 1005
Dashboard Builder for Configuration Validation
Example Note 2562089 : Dashbord Tile and Drilldown View
© 2022
2018-03 SAP SE. All rights reserved. 1006
February 2018
Topics February 2018
Recordings:
DSAG (German)
ASUG
© 2022
2018-02 SAP SE. All rights reserved. 1008
Recommended Notes for System Recommendations
Note 2585487 - SysRec7.2 notes for obsolete kernel versions are displayed for the target
system
Note 2590592 - SysRec7.2 Support Package for kernel notes are missing
© 2022
2018-02 SAP SE. All rights reserved. 1009
General Customizing and Personalization
Transaction SM30_DNOC_USERCFG_SR
SYSREC_STATUS_FILTER (*) Defines which SAP Notes are counted on the overview page: By default it only shows notes with status
'new' or 'new version available' (in use up to 7.2 SP 6).
SYSREC_UPL_ACTIVE (*) Activate/deactivate the integration with UPL/SCMON while showing the object list of ABAP notes.
SYSREC_UPL_MONTH (*) Count of month for which UPL/SCMON data get loaded. The default is 2 which represents the current and
the previous month.
SYSREC_NOTE_TYPES Defines for which types of notes the application calculates results. Enter the list of characters representing
the note types HotNews, Security, Performance, Legal Change, Correction, and License Audit.
SYSREC_LAST_MONTHYEAR Defines the earliest calculated notes. By default the application calculates all SAP Notes which were
released between January 2009 and the current month.
SYSREC_BPCA_USER Defines if the current user should be added as selection for BPCA.
SYSREC_BPCA_DATE Defines the earliest filter for BPCA results. You can change the start date for this period.
SYSREC_CHARM_LOG_TYPE Defines the text id according to table TTXID for the text object CRM_ORDERH.
SYSREC_CHARM_USER Defines if the current user should be added as selection for ChaRM.
SYSREC_CHARM_DATE Defines the earliest filter for ChaRM results. You can change the start date for this period.
SYSREC_OBJECT_EXP Lifetime of the cache which contains the object list of notes. The default is 14 days.
SYSREC_REQ_EXP Lifetime of the cache which contains the required notes of notes. The default is 14 days.
SYSREC_SIDE_EFFECT Lifetime of the cache which contains the side-effect notes of notes. The default is 14 days.
SYSREC_UNSUPPORTED_SYSTEM (*) System types which you want to block from SysRec (one entry per system type)
SYSREC_UNUSED_SUBHR Calculate results for unused HR components (see note 2712210)
(*) User specific personalization
© 2022
2018-02 SAP SE. All rights reserved. 1010
Note 2408073 - Handling of Digitally Signed notes in SAP Note
Assistant (reloaded)
“Upload notes file”, “upload TCI file” and “download note from Support Portal” now work quite
similar. All methods deal with files and verify the digital signature using external program
sapcar.
Required Authorizations:
Auth.-Object Field 1 Field 2 Field 3
S_CTS_ADMI CTS_ADMFCT=TABL
S_C_FUNCT PROGRAM=CL_SCWN_DS_VERIFY=============CP ACTVT=16 CFUNCNAME=SYSTEM
S_DATASET PROGRAM=CL_SCWN_NOTE_SAR_FILE_N=======CP ACTVT=33 FILENAME=/usr/sap/trans/tmp/*
S_DATASET PROGRAM=SAPLOCS_FILEMGMT ACTVT=06,34 FILENAME=/usr/sap/trans/tmp/*
S_RFC_ADM RFCDEST=SAPOSS,SAPSNOTE ACTVT=36
rdisp/call_system = 1 (default)
© 2022
2018-02 SAP SE. All rights reserved. 1011
EarlyWatch Alert Workspace in Support Portal Launchpad
https://launchpad.support.sap.com/#/ewaworkspace
SAP EarlyWatch Alert Workspace – gain an overview on your system landscape health
https://blogs.sap.com/2017/08/15/sap-earlywatch-alert-workspace-gain-an-overview-on-your-system-landscape-health/
Link to Alert
Solution Finder
ewasolutionfinder
Note 2517661 - How to include EWA Fiori Cloud apps into customer launchpads
© 2022
2018-02 SAP SE. All rights reserved. 1015
EarlyWatch Alert Solution Finder in Support Portal Launchpad
https://launchpad.support.sap.com/#/ewasolutionfinder
You can view the EWA Alerts in Support Portal Launchpad, i.e. you can search for “Security”
4 Systems Gateway Security (Security → ABAP Stack → Gateway and Message Server Security )
Gateway access control list (reg_info / sec_info) contains trivial entries (P TP=* USER=* USER-HOST=* HOST=*)
6 Systems Default Passwords of Standard Users (Security → ABAP Stack)
Standard users including SAP* or DDIC have default password
14 Systems SAP HANA Network Settings for Internal Services (Security → SAP HANA Database HPJ)
SAP HANA internal network configuration is insecure
2 Systems SAP HANA Network Settings for System Replication Communication (listeninterface) (Security → SAP HANA Database P22)
SAP HANA network settings for system replication is insecure
22 Systems ABAP Password Policy (Security → ABAP Stack)
Secure password policy is not sufficiently enforced (login/min_password_lng and login/password_max_idle_initial)
6 Systems Gateway Security (Gateway and Message Server Security )
Gateway Access Control List (reg_info / sec_info) contains trivial entries (P TP=*)
22 Systems Users with Critical Authorizations (Security → ABAP Stack)
A high number of users has critical authorizations
15 Systems Default Passwords of Standard Users (Security → ABAP Stack)
Standard users other than SAP* or DDIC have default password
3 Systems Protection of Passwords in Database Connections (Security ➡ ABAP Stack)
Protection of passwords in database connections (note 1823566)
3 Systems SAP HANA SSFS Master Encryption Key (Security → SAP HANA Database)
SAP HANA SSFS master encryption key is not changed (note 2183624)
© 2022
2018-02 SAP SE. All rights reserved. 1016
EarlyWatch Alert for RFC Gateway
Example
or
➢ Monitored System sends EWA data directly If you don't want to have HANA Checks in your
Note 207223 - SAP EarlyWatch Alert processed at SAP EarlyWatch Alert of a HANA Database which is
connected via DBCON, then create an entry in
DBACOCKPIT with this connection and add in
➢ SAP ONE Support Launchpad: the description field NON_EWA_...
Authorization: “Service Reports & Feedback”(English), Note 1985402.
Adjust the settings in table SPTH and set profile parameter abap/path_normalization
(described in note 2551541) to the value ext
Values:
off no check for SPTH, not recommended
res restricted check for SPTH (compatibility setting of note 2433777 ), not recommended
on (default), ok
ext extended check for SPTH replacing relative paths (introduced with note 2562089), ok
Some files are protected always: .pse files, cred_v2 file, SSFS-dat-files, SSFS-key-files
Related note: Note 2433777 - Missing Authorization check in ABAP File Interface
Related topic: Security Optimization Project “Secure against Directory Traversal using transaction
(S)FILE”, see note 1497003
© 2022
2018-02 SAP SE. All rights reserved. 1019
Security Optimization Project “Secure against Directory Traversal
using SPTH”
Online Help SPTH
https://help.sap.com/doc/abapdocu_750_index_htm/7.50/en-US/abenfile_interface_authority.htm
© 2022
2018-02 SAP SE. All rights reserved. 1020
Note 2525222 - [multiple CVE] Security vulnerabilities in SAP
Internet Graphics Server (IGS)
The note solves multiple security vulnerabilities (multiple CVE entries)
In addition a new configuration setting is introduced.
The IGS is downwards compatible in in its main release. You can always use the latest IGS version.
See notes 454042, 514841 (Troubleshooting when a problem occurs with the IGS), and 959358.
Remember to remove the old version of the IGS before installing the new one. Your configuration files
will not be removed and can be reused by the new IGS.
SAP IGS is not listed in System→Status but it may be part of an ABAP system in LMDB, therefore it
could be covered by System Recommendations (but maybe miss the patch level). Some other notes
about IGS might be visible in System Recommendations because of additional assignments to the
Kernel.
See slides about note 2380277 to learn how to check the version of the IGS
Solution: SAP IGS 7.20 SP 15,
7.45 SP 4, 7.49 SP 2, 7.53 SP 2
© 2022
2018-02 SAP SE. All rights reserved. 1021
Note 2525222 - [multiple CVE] Security vulnerabilities in SAP
Internet Graphics Server (IGS)
LMDB (if SAP IGS is registered – only in this case you get a result in System Recommendations):
© 2022
2018-02 SAP SE. All rights reserved. 1022
Note 1584573 - Security Verdict in SUGM SAUS SUGM
Note 1977547 - Update 1 to Security Note 1584573
The note is about Upgrade Tools which are a quite special part of SAP_BASIS. It’s not possible to
restrict the validity of the note or the correction instructions as usual.
Existing disclaimer:
➢ If the object from these correction instructions is not available in the system, or if it contains no source code or
contains only comment lines, you can ignore the correction instructions.
Disclaimer added:
➢ This note is only relevant for newly installed systems or systems which never have been updated using
Software Update Manager 1.0 or 2.0.
If you have used Software Update Manager since 2014 you do not need to apply this note and you can set the
status to ‚irrelevant‘.
Proposal:
➢ Check the condition described in note 1977547 and/or
➢ Try to implement both notes using SNOTE, if SNOTE refuses implementation, set note to ‘irrelevant’
© 2022
2018-02 SAP SE. All rights reserved. 1023
January 2018
Topics January 2018
Instead of the Root CA certificate you can import the sub CA certificate
SAPSUPPORT User Sub CA into both PSE stores SNC
SAPCryptolib (for SAPGUI) and SSL-Server Standard (for HTTP
connections)
© 2022
2018-01 SAP SE. All rights reserved. 1026
Note 2562127 - R/3 Support Remote Connection with SNC / SSO
Note 2562154 - HTTP Remote Connection with SNC / SSO
You can use application Configuration Validation with Configuration Store PSE_CERT to check
for the existence of one of the certificates:
APPLICATION CONTEXT TYPE SUBJECT ISSUER SERIALNO VALID_FROM VALID_TO
<SNCS> PROG CERTIFICATE CN=SAPSUPPORT Root CA, CN=SAPSUPPORT Root CA, D9F939E522DF0B05 20170801131155 20270801131155
O=SAP-SE, C=DE O=SAP-SE, C=DE
DFAULT SSLS CERTIFICATE CN=SAPSUPPORT Root CA, CN=SAPSUPPORT Root CA, D9F939E522DF0B05 20170801131155 20270801131155
O=SAP-SE, C=DE O=SAP-SE, C=DE
<SNCS> PROG CERTIFICATE CN=SAPSUPPORT User Sub CA, CN=SAPSUPPORT Root CA, 02D31A38275D30D9C8 20170801131155 20220801131155
O=SAP-SE, C=DE O=SAP-SE, C=DE
DFAULT SSLS CERTIFICATE CN=SAPSUPPORT User Sub CA, CN=SAPSUPPORT Root CA, 02D31A38275D30D9C8 20170801131155 20220801131155
O=SAP-SE, C=DE O=SAP-SE, C=DE
© 2022
2018-01 SAP SE. All rights reserved. 1027
Transparent Software Vulnerability Disclosure
SAP is a CVE Naming Authority
SAP is now a CVE Numbering Authority. Using Common Vulnerabilities and Exposures, an industry
standard, as a mechanism to disclose patches to vulnerabilities reported by external sources, SAP will
facilitate faster security patch consumption. This initiative will also support tools that report on
vulnerabilities using CVE disclosures, thereby enabling automation of security processes and
transparency for SAP customers. The release of CVE disclosures is aligned with SAP's Security Patch
Day that takes place on the second Tuesday of every month.
Contact: [email protected]
Search for keyword „SAP“:
➢ https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=SAP
Search for entries about vendor SAP (via NIST Advanced Search with Vendor = SAP):
➢ List
➢ Statistics
Who is affected?
All systems that use Intel, ARM and AMD CPU although with different impact and risks.
January 3 information on how to exploit functionalities related with the CPU architecture that can lead
to information disclosure were made public.
Linux
Note 2586312 - Linux: How to protect against speculative execution vulnerabilities?
Note 2591472 - IBM Z: How to protect against speculative execution vulnerabilities?
Windows
https://wiki.scn.sap.com/wiki/display/ATopics/SAP+on+Windows
→ Important SAP Notes
Note 2585591 - How to protect against speculative execution vulnerabilities on Windows?
© 2022
2018-01 SAP SE. All rights reserved. 1032
Meltdown and Spectre
Cloud
Note 2588225 - How to protect against speculative execution vulnerabilities on IBM Cloud?
Note 2588298 - Fixes for Speculative Execution Vulnerabilities on Alibaba Cloud
Note 2588044 - How to protect against speculative execution vulnerabilities on Google Cloud Platform
(GCP)?
Note 2588867 - How to protect against speculative execution vulnerabilities on Microsoft Azure?
Note 2589580 - How to protect against speculative execution vulnerabilities on Amazon Web Services
(AWS)?
Note 2588124 - How to protect against speculative execution vulnerabilities on Oracle Cloud
Infrastructure?
© 2022
2018-01 SAP SE. All rights reserved. 1033
Note 2576306 - Transport-Based Correction Instruction (TCI) for
Download of Digitally Signed SAP Notes (reloaded)
Good news: Instead of implementing notes 2408073, 2546220, and 2508268 manually (which
would lead to multiple manual activities) you can implement the new TCI for SNOTE as
described in note 2576306. You do not need to perform any manual activities in this case.
Prerequisite: Note 2187425 describes how to prepare the Note Assistant (Transaction SNOTE)
to consume TCIs:
SPAM Version 66 or higher
(update SPAM via client 000)
plus Note Assistant Bootstrapping note:
for SAP BASIS 700 Note 2446868
for SAP BASIS 701,702 Note 2444141
as of SAP BASIS 731 Note 1995550
plus note 2520826
Note 2408073 still describes how to extract notes text files from digitally signed archive files in
case SNOTE is not prepared in time.
© 2022
2018-01 SAP SE. All rights reserved. 1034
Note 2554853 - SAP NetWeaver download service for SAP Notes
Note 2554853 „SAP NetWeaver download service for SAP Notes” recommends to set
ssl/client_ciphersuites = 918:PFS:HIGH::EC_P256:EC_HIGH
This is secure and the most reasonable & equivalent recommendation as in note 510007.
Beginning with CommonCryptoLib 8.5.4 (see note 2288631), the cipher suite 3DES_EDE_CBC
was demoted from class HIGH to class MEDIUM, and will also become disabled by above
parameter values. (You can disable cipher suite 3DES_EDE_CBC via token !e3DES as well.)
Quite strict example (which might to lead to issues depending on the individual IT landscape):
ssl/ciphersuites = 550:PFS:HIGH:!e3DES:!mSHA1:TLS_FALLBACK_SCSV::EC_HIGH:+EC_OPT
ssl/client_ciphersuites = $(ssl/ciphersuites)
Prerequisite: Ensure that all clients and servers including legacy 3rd party software are able to work with
remaining protocols and cipher suites. Enable logging about TLS properties of established TLS sessions
according to note 2379540, check note 510007 first and be aware of note 2384290.
Execute sapgenpse tlsinfo –c to see the effective list of available protocols and cipher suites.
© 2022
2018-01 SAP SE. All rights reserved. 1035
Notes 1891583 / 2065596 - Restricting logon to the application server
You can restrict new logons to application servers using dynamically switchable profile
parameter login/server_logon_restriction
0: No restriction (default)
All users can log on to the application server
1/3: A logon to the application server is allowed only if the user is assigned to a security policy
containing attribute SERVER_LOGON_PRIVILEGE with value 1 (see transaction SECPOL)
The recommended values 3 respective 4 allow internal logons like the execution of ‘background job
steps’ or ‘internal RFC calls’
The Apache Oliglo Library is not part of any SAP standard product. This note is only relevant to
you if you make use of the open source library in OData development processes.
Conclusion:
© 2022
2018-01 SAP SE. All rights reserved. 1039
Note 2453871 - Cross-Site Scripting (XSS) vulnerability in SAP
BusinessObjects Design Studio
Note 2453871 had no validity information and was not assigned to any SP (solved now).
Because of this it is visible as a required note for all systems (ABAP, Java, HANA, …) in
application System Recommendations of the SAP Solution Manager.
The note 2453871 refers to notes 2376849 (1.6 SP 5) and 2555577 (1.6 SP 6)
© 2022
2018-01 SAP SE. All rights reserved. 1040
Note 2341600 - SUIM | Search in role menu RSUSR_ROLE_MENU
Tipp:
• No selection on selection screen for “Type of Menu Entry” but use …
• Filter for “Type of Menu Entry”: *Fiori* and *Service*
• Filter for “Type of Application”: = <empty> and *Gateway*
• Show additional column “Name” (which shows the hash value)
• Save the Layout …
• and use this Layout on selection screen
© 2022
2018-01 SAP SE. All rights reserved. 1042
December 2017
Topics December 2017
© 2022
2017-12 SAP SE. All rights reserved. 1044
Note 2449757 - Additional Authentication check in Trusted RFC on
own system
Trusted systems
ERP Implicit
SAP Solution Manager
Client 100 Trust
Admin
Client 000
ERP
Client 150
SolMan Implicit
Client 200 Trust
© 2022
2017-12 SAP SE. All rights reserved. 1045
Note 2449757 - Additional Authentication check in Trusted RFC on
own system
A Trusted RFC connection can be established to a different client or a different user on the same
system, although no explicit Trusted/Trusting Relation to the own system has been defined via
transaction SMT1.
As of Kernel 7.21 patch 920, 7.22 patch 417, 7.45 patch 519, 7.49 patch 310 you can activate
profile parameter rfc/selftrust to force that Trusted RFC requires an explicit trust
relationship even within the same system.
Caution: Wait for Kernel update as described in note 2614667 before activating the parameter in
systems where you want to define Trusted RFC destinations within the same system.
Related note 2413716 - Setup of Trusted RFC in GRC Access Control EAM
© 2022
2017-12 SAP SE. All rights reserved. 1046
Note 2357141 - OS Command Injection vulnerability in Report for
Terminology Export
Published in November 2016, updated in November 2017
New manual instruction to copy & modify a GUI status and to block functions ‘Execute and
Print’ and ‘Execute in Background’ for submitting report TERM_TBX_EXPORT.
You need to implement this modification to be able to execute the report again only if you are
using report TERM_TBX_EXPORT (which is not the case) and if you do not have one of the listed
Support Packages.
© 2022
2017-12 SAP SE. All rights reserved. 1047
SAP HANA Security Notes
Note 2549983 - [CVE-2017-16687] Information Disclosure in SAP HANA XS classic user self-service
Affected are the user self-services, which are part of SAP HANA XS classic content. The user self-services are deactivated
by default. Deactivated user self-services they are not affected by this issue. (See note how to check status of self-services.)
An unauthenticated user could use the error messages to determine if a given username is valid.
The issue is fixed with the following HANA revisions:
HANA 1.0 SPS 12 revision 122.10, HANA 2.0 SPS 00 revision 2.02, HANA 2.0 SPS 01 revision 12, HANA 2.0 SPS 02
Note 2522510 - [CVE-2017-16680] Potential audit log injection vulnerability in SAP HANA XS Advanced
Affected is the XS advanced runtime.
Attackers can inject control characters in XSA’s logs. The interpretation of audit log files could be hindered or misdirected.
Fixed with XSA 1.0.63
© 2022
2017-12 SAP SE. All rights reserved. 1048
Note 2427292 - Information disclosure in SAP MMC Console
Note 2500044 - Full access to SAP Management Console
Both notes addresses potential security vulnerabilities about Java Reflection.
Older J2EE versions, which do not yet use a key to trigger web services, are not affected.
This leads to a loose correlation between kernel and J2EE version.
Mitigation:
• Strictly restrict development and deployment rights on your J2EE instance – which you
should do anyway.
© 2022
2017-12 SAP SE. All rights reserved. 1049
Note 2562127 - R/3 Support Remote Connection with SNC / SSO
Note 2562154 - HTTP Remote Connection with SNC / SSO
You want to encrypt all communications channels, i.e. between user network and server
network. You have activated SNC either as
and you want to enforce that SNC is used for all connections by deactivating profile parameter
snc/accept_insecure_gui (old) respective activating snc/only_encrypted_gui
(recommended).
Implement the notes to allow SAP support remote connections using the Secure Network
Communication (SNC) protocol, too.
(Workaround used so far: Set snc/accept_insecure_gui=U to allow exceptions for such users)
© 2022
2017-12 SAP SE. All rights reserved. 1050
Note 2562127 - R/3 Support Remote Connection with SNC / SSO
Note 2562154 - HTTP Remote Connection with SNC / SSO
One SNC Name CN=SAPSUPPORT, O=SAP-SE, C=DE is used for all SAP support users. Assign
this name to all such user accounts in all relevant clients, i.e. client 000 and the productive
client.
• in transaction SU01 or
via transaction SM30 for table USRACL (for SAPGUI)
(Take care to add leading p: to the SNC name)
© 2022
2017-12 SAP SE. All rights reserved. 1051
Note 2562127 - R/3 Support Remote Connection with SNC / SSO
Note 2562154 - HTTP Remote Connection with SNC / SSO
© 2022
2017-12 SAP SE. All rights reserved. 1052
Note 2562127 - R/3 Support Remote Connection with SNC / SSO
Note 2562154 - HTTP Remote Connection with SNC / SSO
© 2022
2017-12 SAP SE. All rights reserved. 1053
Note 2562127 - R/3 Support Remote Connection with SNC / SSO
Note 2562154 - HTTP Remote Connection with SNC / SSO
Add the SNC name of your system at “Servers & SAPRouters”
for your application server(s)
© 2022
2017-12 SAP SE. All rights reserved. 1054
Note 2562127 - R/3 Support Remote Connection with SNC / SSO
Note 2562154 - HTTP Remote Connection with SNC / SSO
Add the new protocols…
© 2022
2017-12 SAP SE. All rights reserved. 1055
Note 2562127 - R/3 Support Remote Connection with SNC / SSO
Note 2562154 - HTTP Remote Connection with SNC / SSO
SAP support users do not need a password anymore
Enter some explaining text instead of a password
You still should assign the user entry to the incident to tell about the user name!
© 2022
2017-12 SAP SE. All rights reserved. 1056
Note 2562127 - R/3 Support Remote Connection with SNC / SSO
Note 2562154 - HTTP Remote Connection with SNC / SSO
© 2022
2017-12 SAP SE. All rights reserved. 1057
Note 2562127 - R/3 Support Remote Connection with SNC / SSO
Note 2562154 - HTTP Remote Connection with SNC / SSO
Remote Support
https://support.sap.com/remoteconnection
Blogs:
…
© 2022
2017-12 SAP SE. All rights reserved. 1058
Note 2531131 - Switchable Authorization checks for RFC
BCA_DIM_WRITE_OFF in Loans (FI-CAX-FS)
Following Support Packages for Software Component FI-CAX contain the coding part of the
solution:
Do not forget the general manual configuration for this type of correction “SACF”:
© 2022
2017-12 SAP SE. All rights reserved. 1059
Recommended Notes for System Recommendations 7.2
© 2022
2017-12 SAP SE. All rights reserved. 1060
October 2017
2017-10
Topics October 2017
Note 2408073 - Handling of Digitally Signed notes in SAP Note Assistant (reloaded)
Note 2371726 - Code Injection vulnerability in Text Conversion
Note 2269032 - Authorization check for S_PROGRAM
Note 2457014 - Missing Authorization check in PA-PA-US
Note 2531241 - Disclosure of Information/Elevation of Privileges LVM 2.1 and LaMa 3.0
Note 2520772 - Disclosure of Information/Elevation of Privileges LaMa 3.0
Check RFC Callback protection using Configuration Validation
© 2022
2017-10 SAP SE. All rights reserved. 1062
Note 2408073 - Handling of Digitally Signed notes in SAP Note
Assistant (reloaded)
It’s not possible to prepare SNOTE automatically by implementing notes 2518518 and 2408073
anymore. Note 2518518 is archived, instead you have to follow some new manual
implementation steps in note 2408073:
• Create a table
• Create an application log object
• Create messages
• Change a GUI status and GUI title
• Create text elements
Note 2408073 still describes how to extract notes text files from digitally signed archive files in
case SNOTE is not prepared in time.
© 2022
2017-10 SAP SE. All rights reserved. 1063
Note 2371726 - Code Injection vulnerability in Text Conversion
Critical note:
(correction of old
Security Note 1673713)
First published in November 2016 with version 5 – What was changed now with version 6?
➢ Implement the new version of the note using SNOTE but do not expect to get a change.
© 2022
2017-10 SAP SE. All rights reserved. 1064
Note 2269032 - Authorization check for S_PROGRAM
The authorization check for execution of reports S_PROGRAM associated with an report
authorization group has been made stricter in SAP_BASIS 7.40 and 7.50.
With this note the RFC enabled function module HR_EXPORT_TO_OTHER_SYS_US_CE calls
Business Add-In HRPAD00AUTH_DIST with a default implementation restricting the executable reports
to reports using HR logical databases – which will be successful in this case if the BAdI is active. This
Business Add-In was delivered with note 1531288.
© 2022
2017-10 SAP SE. All rights reserved. 1066
Notes 2531241 and 2520772 - Disclosure of Information/Elevation of
Privileges LVM 2.1 and LaMa 3.0
Both notes target SAP Landscape Management (LaMa) which was formerly known as Landscape Virtualization
Management (LVM).
This application automates system operations and requires to store passwords of managed systems in
the Secure Store of Java.
Both notes propose following manual actions:
➢ Install the patch
VCM LVM 2.1 SP 10 patch 1
VCM LVM 3.0 SP 4 patch 1
VCM LVM ENTERPRISE 3.0 SP 4 patch 1
Online Help
© 2022
2017-10 SAP SE. All rights reserved. 1068
Check RFC Callback protection using Configuration Validation
Software Packages
Configuration Items ... Configuration Items
© 2022
2017-10 SAP SE. All rights reserved. 1071
Check RFC Callback protection using Configuration Validation
You use Configuration Reporting to show cross-system reports about configuration settings
The following Configuration Stores are used to check RFC Callback protection:
© 2022
2017-10 SAP SE. All rights reserved. 1072
Check RFC Callback protection using Configuration Validation
Transaction CCDB
© 2022
2017-10 SAP SE. All rights reserved. 1073
Check RFC Callback protection using Configuration Validation
Transaction CCDB
© 2022
2017-10 SAP SE. All rights reserved. 1074
Check RFC Callback protection using Configuration Validation
© 2022
2017-10 SAP SE. All rights reserved. 1075
Check RFC Callback protection using Configuration Validation
© 2022
2017-10 SAP SE. All rights reserved. 1076
Check RFC Callback protection using Configuration Validation
© 2022
2017-10 SAP SE. All rights reserved. 1077
September 2017
Topics September 2017
© 2022
2017-09 SAP SE. All rights reserved. 1079
Note 2408073 - Handling of Digitally Signed notes in SAP Note
Assistant
Security Spotlight News
SAP is making Notes more secure by ensuring all SAP Notes files are digitally signed.
We strongly recommend customers to upload only digitally signed SAP Notes files once they are made available.
To prepare your system to consume digitally signed SAP Notes files, please implement SAP Security Note
2408073. Without implementing this SAP Security Note, it will not be possible to upload a digitally signed SAP
Note file.
Please also note, with SAP Security Note 2408073, the digital signature verification feature is enabled only for
uploading signed SAP Notes files. The feature to download a digitally signed SAP Note via SAPOSS connection
will be released to Customers in the coming months. It is recommended to implement SAP Note 2408073 before
download functionality is released.
For details, please visit this blog. Watch the Note Assistant page on SAP Support Portal, for the latest updates
© 2022
2017-09 SAP SE. All rights reserved. 1080
Note 2408073 - Handling of Digitally Signed notes in SAP Note
Assistant
SAP plans to deliver digitally signed note files on SAP Support Portal.
Currently you get a .ZIP file containing a .TXT file. In the future you’ll get a .SAR file instead.
© 2022
2017-09 SAP SE. All rights reserved. 1082
Note 2408073 - Handling of Digitally Signed notes in SAP Note
Assistant
Implement note 2518518 first. Run the report SCWN_NOTE_2408073 delivered with this note and
then proceed with implementation of note 2408073.
Use the attached file 0002424539_00.SAR to test the verification of a digitally signed .SAR
file. After uploading the file, check the log of note 2424539 in your worklist:
Report SCWN_DS_CLEAR_NOTE_FILE can be used to delete temporary files if this is not done
automatically. The temporary .ZIP files and .SAR for the notes and the temporary file
SIGNATURE.SMF are located in folder $(DIR_TRANS)/tmp
Related topic:
Note 2178665 - Signature validation of archives with SAPCAR
Note 1634894 - SAPCAR: Signed Archive
© 2022
2017-09 SAP SE. All rights reserved. 1084
Note 2520064 - Missing Authentication check in SAP Point of Sale
Note 2528596 - Hard-coded Credentials in POS Store Manager
Important Security Fix for SAP Point of Sales (POS) Retail Xpress Server - August 18, 2017
In IT-Security Conference (HITB GSEC conference, 24th August, 2017), there was a presentation on
vulnerabilities affecting SAP Point of Sales (POS) Retail Xpress Server.
http://gsec.hitb.org/sg2017/sessions/get-to-the-money-hacking-pos-and-pop-systems/
Note 2528596 covers notes 2520232 and 2529966 and contains additional corrections.
© 2022
2017-09 SAP SE. All rights reserved. 1085
Note 2483870 - RFC Callback whitelist check for destination BACK
© 2022
2017-09 SAP SE. All rights reserved. 1086
Note 2483870 - RFC Callback whitelist check for destination BACK
Question: “Do I really need Kernel 7.45 patch 515 to secure RFC callback?”
Validity of note:
• Kernel releases 7.21, 7.22, 7.45, 7.49, 7.50, 7.51
Solution:
• Kernel 7.45 patch 515, 7.49 patch 221
The note solves a side effect (=bug) which was introduced with note 2463707.
Solution (and introduction of new bug) of this note 2463707:
• Kernel 7.45 patch 515, 7.49 patch 215
➢ On Release 7.45 the solution is part of the same patch as the previously introduced bug → no issue
➢ However, all Kernel versions before 7.45 patch 515 might be affected by the issue about internal RFC calls,
which require RFC allowlist entries
➢ You log RFC callback using the Security Audit Log anyway → no issue (except that you might end up with
some additional RFC allowlist entries which are not required in the future)
© 2022
2017-09 SAP SE. All rights reserved. 1087
Note 2483870 - RFC Callback whitelist check for destination BACK
Generate callback whitelist
Transaction SM59
© 2022
2017-09 SAP SE. All rights reserved. 1088
Note 2483870 - RFC Callback whitelist check for destination BACK
Required whitelist entries
Note 2251931 - Runtime error CALLBACK_REJECTED_BY_WHITELIST
in graphical Screen Painter (Transaction SE51 / SE80)
Destination EU_SCRP_WN32
Functions (generate them or add them manually):
RS_SCRP_GF_PROCESS* RFC_GET_FUNCTION_INTERFACE
RS_SCRP_GF_PROCESS* RS_SCRP_GF_*
Important because
Relevant if
• Switch RECFA VERIF is active which defines that applicants have to confirm their email
addresses in order to be able to submit the application. This is the default setting.
© 2022
2017-09 SAP SE. All rights reserved. 1090
Note 2507798 - Bypass of email verification in e-recruiting
© 2022
2017-09 SAP SE. All rights reserved. 1091
Note 2449011 - SUIM | Search for startable applications in roles
References:
SV-RDS – Rapid Deployment Solutions
SV-RDS-PAK – Package Manager
Note 2041140 - Order SAP pre-assembled Best Practices solution software appliance as an SAP Partner
https://blogs.sap.com/2017/05/15/partner-packaged-solutions-on-sap-best-practices-explorer-s4hana-and-beyond
© 2022
2017-09 SAP SE. All rights reserved. 1093
Note 2051717 - SQL-Injection-Schwachstelle in SAP Netweaver
Old correction form beginning of 2015 according to the assigned Support Packages
© 2022
2017-09 SAP SE. All rights reserved. 1094
August 2017
Topics August 2017
© 2022
2017-08 SAP SE. All rights reserved. 1096
What's new in Configuration Validation
How to start it on SolMan 7.2
© 2022
2017-08 SAP SE. All rights reserved. 1097
What's new in Configuration Validation
SolMan 7.2 SP 3: More ABAP Configuration Stores
Transactions
LOCKED_TRANSACTIONS
Virus Scan Providers
VSCAN_GROUP
VSCAN_SERVER
XXX
GLOBAL_CHANGE_LOG
COMPONENTS_CHANGE_LOG XXX
XXX
NAMESPACES_CHANGE_LOG XXX
AUTH_PROFILE_USER_CHANGE_DOC
(customizing possible, timestamps are extracted from the managed system log)
XXX
SAPUI5 XXX
XXX
SAPUI5_LIBS
SAPUI5_VERSION
XXX
SYSTEM_TIMEZONE
XXX
XXX
Configuration stores:
sapGroupAllAssignedUsers:<group>
sapRoleAllAssignedUsers:<role>
sapRoleAssignedActions:<action>
sapUserProperties:<user>
Reporting directory
includes Bookmark now
Comparison Lists
Badi Implementation to build dynamic
comparison list base on the BAdI
enhancement DIAGCV_ES1_SYSTEM_LIST
For more information see note 2365039
BI Reporting
Larger Strings in columns (up to 250 chars instead of 60 chars)
© 2022
2017-08 SAP SE. All rights reserved. 1100
What's new in Configuration Validation
SolMan 7.2 SP 3: Send Configuration Validation reports via email
© 2022
2017-08 SAP SE. All rights reserved. 1101
What's new in Configuration Validation
SolMan 7.2 SP 3: Send Configuration Validation reports via email
On SolMan 7.2 SP 3-4 you have to install following notes to get these reports:
Note 2427770 - Configuration Validation: Sending compliance results via email
Note 2401878 - ST7.20 SP03/04 Configuration Validation - Send mail with system
recommendation results
© 2022
2017-08 SAP SE. All rights reserved. 1102
What's new in Configuration Validation
SolMan 7.2 SP 5: Merge Target Systems
Usage: MERGSYS1
MERGSYS1 – Combined from baseline template
Create several small target systems
representing individual KPIs.
Use these target systems e.g. to create
a Dashboard.
Merge these target systems into one for
reporting.
Example: Merge the SAP Security
Baseline target systems into one
combined target system
© 2022
2017-08 SAP SE. All rights reserved. 1103
What's new in Configuration Validation
SolMan 7.2 SP 5: New key operator for table stores: regex
New key operator (regex) for table stores
© 2022
2017-08 SAP SE. All rights reserved. 1104
What's new in Configuration Validation
SolMan 7.2 SP 5: New Configuration Stores and Fields
New Configuration Store
ABAP_INSTANCE_PAHI_ENH
allows to check if parameter
icm/server_port_0 to 9 contains at least
one entry about HTTPS
SYSLOG
TABLE
TABLE
TABLE
© 2022
2017-08 SAP SE. All rights reserved. 1105
What's new in Configuration Validation
SolMan 7.2 SP 5: New Configuration Stores and Fields
DDIC
© 2022
2017-08 SAP SE. All rights reserved. 1106
What's new in Configuration Validation
SolMan 7.2 SP 5: New Configuration Stores for HANA XSA
© 2022
2017-08 SAP SE. All rights reserved. 1107
What's new in Configuration Validation
SolMan 7.2 SP 5: Miscellaneous
Navigation within Validation to Trend Analysis (Items, Roles, and Query showing latest data)
© 2022
2017-08 SAP SE. All rights reserved. 1108
What's new in Configuration Validation
SolMan 7.2 SP 5: Dashboard Builder Integration
© 2022
2017-08 SAP SE. All rights reserved. 1109
What's new in Configuration Validation
SolMan 7.2 SP 5: Dashboard Builder Integration
Dashboard Tile
© 2022
2017-08 SAP SE. All rights reserved. 1110
What's new in Configuration Validation
SolMan 7.2 SP 5: Dashboard Builder Integration
© 2022
2017-08 SAP SE. All rights reserved. 1111
What‘s new in System Recommendation
If a Software Components are not part of ABAP/JAVA/HANA systems in SLD/LMDB you do not
find corresponding notes in System Recommendation.
CRYPTOLIB 8 SP000 added to ABAP and JAVA systems as a virtual software component
as of July 2017
© 2022
2017-08 SAP SE. All rights reserved. 1112
Note 2394536 - URL Redirection vulnerability in Knowledge
Management and Collaboration and Web Page Composer
“Solution: The fix is provided in patches for KMC-CM and KMC-WPC components.
The portal has to be restarted after deploying the patches, and all XMLForms projects have to
be regenerated.”
© 2022
2017-08 SAP SE. All rights reserved. 1113
Note 2216306 - S_RFC check and profile parameter
auth/rfc_authority_check
By default you do not need authentication and no authorization to call one of the RFC enabled
function of function group SRFC:
RFC_PING
RFC_SYSTEM_INFO shows release info
RFC_GET_LOCAL_DESTINATIONS
RFC_GET_LOCAL_SERVERS
RFC_PUT_CODEPAGE
SYSTEM_FINISH_ATTACH_GUI
SYSTEM_INVISIBLE_GUI
SYSTEM_PREPARE_ATTACH_GUI
SYSTEM_RFC_VERSION_3_INIT
To define roles you should list function names using S_RFC with FUNC instead of groups using
S_RFC with FUGR
You can use the Workload Statistics (Transaction ST03N) → RFC Server Profile
or transaction STRFCTRACE to verify if these functions are used in RFC scenarios (or you use
report ZRFC_STATRECS_SUMMARY).
© 2022
2017-08 SAP SE. All rights reserved. 1116
Note 2216306 - S_RFC check and profile parameter
auth/rfc_authority_check
Workload Statistics (Transaction ST03N) → RFC Server Profile
shows a cross-client list of users (but not the client) who might need additional authorizations
2 4
© 2022
2017-08 SAP SE. All rights reserved. 1117
Note 2216306 - S_RFC check and profile parameter
auth/rfc_authority_check
Transaction STRFCTRACE 1. User has authorizations for S_RFC FUNC
or report ZRFC_STATRECS_SUMMARY 2. User does not need authorizations for S_RFC
show a cross-client list of users 3. User has no authorizations for S_RFC
including available respective missing 4. User has critical authorizations for S_RFC *
authorizations for S_RFC 5. User has authorizations for S_RFC FUGR
3
4
5
© 2022
2017-08 SAP SE. All rights reserved. 1118
Note 2417020 - Cross-Site Scripting (XSS) vulnerability in SAP
NetWeaver Business Client for HTML
No change?
© 2022
2017-08 SAP SE. All rights reserved. 1119
Note 2024431 - TDDAT adjustment in customer landscape (reloaded)
Comparison of Table Authorization Group Assignment
As part of standard corrections using SAP Notes or Support Packages, adjustments to table
authorization group assignments were delivered.
However, it is not possible for SAP to change existing table entries by means of a Support Package.
The report TDDAT_COMPARE compares the table authorization group assignments delivered by SAP by
means of Support Packages with the data in your system.
In addition to the comparison state, the result list displays the relevant SAP Note number and the
corresponding application component. We recommend that you use this report after importing a
Support Package to check the table authorization group assignment.
© 2022
2017-08 SAP SE. All rights reserved. 1120
Note 2024431 - TDDAT adjustment in customer landscape (reloaded)
Comparison of Table Authorization Group Assignment
(Older notes are prerequisites of newer notes → it’s sufficient to implement the newest note.)
© 2022
2017-08 SAP SE. All rights reserved. 1121
Note 2356982 - SE54 | Maintenance of table authorization groups
Note 1645260 - Extended maintenance of table authorization groups
When checking for authorizations in transactions like SE16, SM30, SM31, SM34 on the authorization
object S_TABU_DIS, a table authorization group is checked for authorization to access tables or views.
➢ Transaction STBRG
➢ Transaction STDDAT
© 2022
2017-08 SAP SE. All rights reserved. 1122
July 2017
Topics July 2017
© 2022
2017-07 SAP SE. All rights reserved. 1124
Notes about SAP ONE Support Launchpad
Note 2371996 - SAP Security Notes app - SAP ONE Support Launchpad
https://support.sap.com/securitynotes
Note 2361791 - How to filter SAP Legal Change Notes, Security Notes and HotNews on SAP
ONE Support Launchpad
Description how to filter the notes by systems in the tile 'SAP Security Notes', 'SAP HotNews‘, and
'SAP Legal Change Notes'. The system filter contents are maintained in the System Data application.
You need to mark systems in the System Data application as 'Favorite'.
Note 2388433 - Expert Search for SAP Notes & KBAs - SAP ONE Support Launchpad
https://support.sap.com/notes → Expert Search
Note 2348668 - How to activate a tile from the tile catalogue - ONE Support Launchpad
List of all Launchpad tiles currently available
https://support.sap.com/support-programs-services/about/help-index/tile-overview.html
© 2022
2017-07 SAP SE. All rights reserved. 1125
Note 2416119 - Improved security for outgoing HTTPS connections
in SAP NetWeaver
The property UrlCheckServerCertificate of the outgoing HTTP Provider service exists on
Java systems only. It controls if the SSL certificate of the server gets validated by the client.
Upon execution, in the GUI of the tool, from the left menu, navigate to
cluster-data → template-Usage_Type_All_in_One → services → http
It is strongly recommended to switch the value of the property to “true” even if you are not
making any outgoing http(s) calls at present. Note that after enabling this property certain
scenarios involving outgoing https calls to other resources will fail unless you have maintained
proper and valid certificates for the requested resources in the client system’s keystore.
© 2022
2017-07 SAP SE. All rights reserved. 1127
Note 2416119 - Improved security for outgoing HTTPS connections
in SAP NetWeaver
How to find the property UrlCheckServerCertificate in Configuration Validation
– just try it: Transaction CCDB
© 2022
2017-07 SAP SE. All rights reserved. 1128
Transport-Based Correction Instructions (TCI)
This new method “Transport-Based Correction Instructions” (TCI) for shipping corrections is
used in case of components which had published large updates regularly, e.g. the component
for Unified Rendering. This way we can avoid long lists of prerequisite notes which had
produced trouble regularly.
Wiki Page:
https://wiki.scn.sap.com/wiki/x/eoWgGg
SAP Note transport-based correction instructions (TCI) have the following benefits compared
to SAP Notes with correction instructions (CI):
• Fast consumption of consolidated CIs
• Support of all transport-enabled SAP ABAP objects such as DDIC, Table Content, and MIME
• No adjustment activities during SP import and upgrade for SAP standard objects.
• Clear functional focus and less side-effects.
Caution: When you have implemented a TCI, you can currently not deimplement it. To delete
the TCI from the system, you must revert your system to the status it had before you
implemented the TCI. This procedure necessarily requires a system backup.
Note 2187425 - Information about SAP Note Transport based Correction Instructions (TCI)
Note 1995550 - Enabling SNOTE for transport based correction instruction
Note 2345669 - Limitations/Known issues in TCI
Note 2347322 - Note Status of the TCI note is not shown correctly in the subsequent systems
© 2022
2017-07 SAP SE. All rights reserved. 1130
Transport-Based Correction Instructions (TCI)
Unified Rendering
Note 2090746 - Unified Rendering Notes - Which One To Apply - Instructions And Related Notes.
Example: Note 2493427 - Correction for Unified Rendering SAP_UI NW740 TCI 009
This note contains a TCI (=sar-file) which you can download at section “Correction Instruction”
instead of a normal ABAP automatic correction instruction.
SAP Note 2187425 describes how to prepare your system and how this SAP Note can be used in
the SAP Notes Assistant (transaction SNOTE) .
If your SP level is under SAPKB740SP12 SAP_UI , please upgrade your SP version first.
Prerequisiste:
SPAM needs to be updated to SPAM version 63.
Additional SPAM authorization required, see new roles SAP_OCS_STD and SAP_OCS_TCI_IMPORT
© 2022
2017-07 SAP SE. All rights reserved. 1131
Note 1920522 - Unauthorized modification of stored content in SCM
Possible answers:
✓ “No”, because note is old and we already have the Support Package and the manual
activity is only required if you install the note via SNOTE
✓ “Yes”, because the manual activity is required in any case even in new systems
✓ “It depends”, because the manual activity is required even in new systems but only if you use the
application
© 2022
2017-07 SAP SE. All rights reserved. 1132
Note 1920522 - Unauthorized modification of stored content in SCM
Pre-Imp. / Post-Imp.
=
Weak indication that
it‘s only relevant for To-SP limited
implementation via =
SNOTE Strong indication that
it‘s only relevant for
implementation via
Customizing SNOTE
transaction
=
Very strong
indication that you
need it in any case
or if you are using
the application
SAP Host Agent runs on all SAP supported platforms, i.e. ABAP, JAVA, HANA.
The issue is fixed with SAP Host Agent 721 PL25. Which SAP Notes are important for SAP Host Agent?
see Note 1031096 - SAP Host Agent Installation
Note 1031096 - Installing Package SAPHOSTAGENT Note 1473974 - SAP Host Agent Auto upgrade
Note 927637 - Web service authentication in sapstartsrv
Note 1907566 - SAP Host Agent Documentation
Note 2130510 - SAP Host agent 7.21
The SAP Host Agent in SAP HANA has been updated with
• revision 122.10 (for SAP HANA1.00 SPS12, 2017-07-01),
• revision 2.02 (for SAP HANA2.0 SPS00, 2017-07-06), and
• revision 12 (for SAP HANA2.0 SPS01, 2017-06-27).
© 2022
2017-07 SAP SE. All rights reserved. 1134
SAP Host Agent - Frequently Asked Questions
https://wiki.scn.sap.com/wiki/display/ATopics/SAP+Host+Agent+-+Frequently+Asked+Questions
/usr/sap/hostctrl/exe/hostexecstart –version
Using this command, you can use report RSBDCOS0
to check the version of SAPHOSTAGENT
© 2022
2017-07 SAP SE. All rights reserved. 1135
SAP Host Agent
Validate the version using Configuration Validation
Transaction CCDB showing Configuration Store SAPHostAgent with Configuration Item
SAPHOSTAGENT_VERSION
© 2022
2017-07 SAP SE. All rights reserved. 1136
SAP Host Agent
Validate the version using Configuration Validation
Result of Configuration Validation for Configuration Store SAPHostAgent
Content out of
date
Multiple
hosts per
system
No data
© 2022
2017-07 SAP SE. All rights reserved. 1137
SAP Host Agent
What else to do?
Do you have enabled SSL for the Host Agent?
Do you have enabled Audit Logging for the Host Agent?
Check for parameters ssl/server_pse and service/auditlevel and service/logfile_*
in file /usr/sap/hostctrl/exe/host_profile
Use Configuration Store host_profile to check these parameters in application Configuration
Validation.
Transaction RZ21
→ Agent Working Directory
© 2022
2017-07 SAP SE. All rights reserved. 1138
Note 2459319 - Weak encryption used in SAP Netweaver Data
Orchestration Engine
© 2022
2017-07 SAP SE. All rights reserved. 1139
Note 1854252 - Missing authorization-check in BC-SRV-ALV
© 2022
2017-07 SAP SE. All rights reserved. 1140
Note 2252890 - User TMSADM_WF with standard password
Note 2285744 - TMS_UPDATE_PWD_OF_TMSADM_WF
The standard user TMSADM_WF only exists if you are using the TMS Workflow.
It will be created with proper profile assignments but with an standard password.
see SAP Library at
Basis Components → Change and Transport System → Transport Management System →
Configuring TMS → Configuring the Transport Workflow → Resetting User TMSADM_WF
You can change the password of user TMSADM_WF manually as well if you maintain the stored
password in RFC destination TMSWF@WORKFLOW_ENGINE, too.
© 2022
2017-07 SAP SE. All rights reserved. 1141
Note 2252890 - User TMSADM_WF with standard password
Note 2285744 - TMS_UPDATE_PWD_OF_TMSADM_WF
Tipp:
Despite the validity information in the note you do not need to apply the manual correction
instructions of note 2252890 about modifying a message class and about creating a function
group if you update the support package.
However, after creating the function group manually you get a warning during implementation
with SNOTE – in this case, ensure to set the checkbox for overwriting object REPS
SAPLCTW_CONFIG.
Implement note 2285744, too, to solve an error in this report.
© 2022
2017-07 SAP SE. All rights reserved. 1142
June 2017
Topics June 2017
© 2022
2017-06 SAP SE. All rights reserved. 1144
What’s new in System Recommendations SolMan 7.2 SP 3
Send Configuration Validation reports via email
© 2022
2017-06 SAP SE. All rights reserved. 1145
What’s new in System Recommendations SolMan 7.2 SP 5
© 2022
2017-06 SAP SE. All rights reserved. 1146
What’s new in System Recommendations SolMan 7.2 SP 5
Recommendation:
Implement side effect
solving notes right after
implementation of the
original notes
© 2022
2017-06 SAP SE. All rights reserved. 1147
Note 2461414 - SysRec: notes for obsolete kernel versions are
displayed on SolMan 7.2
System Recommendations might shows too many Kernel notes for ABAP and JAVA systems
Example for an ABAP system with Kernel 7.45 patch 412 and SAP_BASIS 7.50 SP 4:
Note 2074736 (only kernel up to 7.42 are affected)
Note 1553180 (only kernel up to 7.20 or SAP_BASIS up to 7.31 are affected)
Note 1453325 (only kernel up to 7.20 or SAP_BASIS up to 7.20 are affected)
[…]
After implementing the note you have to clear the buffers and re-run the System Recommendations
background job according to note 2449853
© 2022
2017-06 SAP SE. All rights reserved. 1149
Note 2380277 - Memory Corruption vulnerability in BC-FES-IGS
© 2022
2017-06 SAP SE. All rights reserved. 1150
Note 2380277 - Memory Corruption vulnerability in BC-FES-IGS
© 2022
2017-06 SAP SE. All rights reserved. 1151
Priority changes because of CVSS, e.g. Notes 2235513, 2235514,
2235515
Notes 2235513, 2235514, 2235515 had been published in 2015 with a priority which was
calculated based on CVSS 2.0.
Note 2235515 was changed in April 2017 to adjust prerequisites of the correction instruction.
© 2022
2017-06 SAP SE. All rights reserved. 1152
Reloaded: How to define cipher suites for SSL/TLS
more samples
SAP ASE
Note 2478377 - Exposure to Sweet32 vulnerability in multiple SAP Sybase products
https://help.sap.com/doc/a6115f7abc2b1014bf21a063974f889e/16.0.2.5/en-US/Security_Administration_Guide_en.pdf
→ Cipher Suites
SuccessFactors
Note 2383957 - Supported Cipher Suites
SAP JVM
Note 2193460 - SSLv3 is disabled in SAP JVM version 4.1, 5.1, 6.1, 8.1
© 2022
2017-06 SAP SE. All rights reserved. 1153
Security notes for the Web Dispatcher
Note 2423429 - Code Injection vulnerability in SAP Web Dispatcher
You can register a Web Dispatcher at the SLD, connect it to the SAP Solution Manager as a
technical system with system type WEBDISP, and enable it in System Recommendations. This
way you get some recommendations about the Web Dispatcher.
However, I guess to get a complete picture about security of the Web Dispatcher you need
more than that.
Keep in mind, that the Web Dispatcher
• rarely gets connected to the SolMan as described above,
• could be used in front of ABAP, Java, and HANA systems,
• is a component which is independent from the Kernel,
• is a component which is an internal part of HANA,
• it is very similar to the Internet Communication Manager (ICM) which is part of the Kernel,
and
• usually requires not only software updates but requires configuration as well to solve
security issues.
© 2022
2017-06 SAP SE. All rights reserved. 1154
Security notes for the Web Dispatcher
Note 2423429 - Code Injection vulnerability in SAP Web Dispatcher
Let’s check the Support Portal to find security Notes about the Web Dispatcher (19.06.2017):
https://support.sap.com/notes → Expert search
I would expect that only these notes could be found by System Recommendations.
And not all of these notes have assignments to both, the Software Component and the Patch,
which would be required for System Recommendations to produce an exact result at least for
the software level (System Recommendations cannot check the configuration anyway).
Whenever you see a Security Note for any of your systems of type ABAP, Java or HANA which
deals with the Web Dispatcher or the Internet Communication Manager (ICM), you should check
if this note could be relevant for all your installations of the Web Dispatcher, too.
© 2022
2017-06 SAP SE. All rights reserved. 1156
May 2017
Topics May 2017
WannaCrypt ransomeware
Remote Code Execution vulnerability in SAP GUI
SNC Client Encryption – Do it!
Note 2443673 - Filter Incoming Serialization Data (JVM)
Disable start of transactions with OKCode skipping the first screen
Note 2062885 - SU01/SU10: New user documentation function
Note 2203672 - SU01/SU10: New user documentation function II
Several notes about SAL | Filter selection by user group
© 2022
2017-05 SAP SE. All rights reserved. 1158
WannaCrypt ransomeware
Summary:
➢ This cyber attack uses a SMB protocol bug (SMB version 1.0) in most unpatched Microsoft
Windows versions to spread out in an internal network
➢ SAP Systems on Windows and of course Windows based clients could be affected
➢ Implement the patches from Microsoft which blocks spreading of the ransomeware
➢ We do not have any reports that these patches have any negative influence to SAP Systems
➢ As a workaround, you can disable the support for SMB v1 to directly block this ports in the firewall,
however, this might affect interfaces to other partner systems. Careful testing required!
© 2022
2017-05 SAP SE. All rights reserved. 1159
Note 2407616 - Remote Code Execution vulnerability in SAP GUI
Note 1768979 - Changes to the SAP GUI security rules file saprules.xml
Previous status
• When installing SNC Client Encryption 1.0, the setup displays the following license disclaimer:
“SNC Client Encryption allows you to encrypt the communication between application server and
client, and is part of your SAP NetWeaver Application Server license. Adding Single Sign-On
capabilities requires an additional license, for SAP NetWeaver Single Sign-On. […]”
• Similar disclaimers are published on the service market place and in a number of notes
Update
✓ The license disclaimer will be updated and the restriction to non-SSO scenarios will be removed:
“SNC Client Encryption allows you to encrypt the communication between application server and
client, and is part of your SAP NetWeaver Application Server license.”
© 2022
2017-05 SAP SE. All rights reserved. 1162
SNC Client Encryption – Do it!
Free encryption: A word of caution
In the past, some customers pointed out that it didn’t seem right to demand a license for a
scenario that combines two free technologies, namely SNC Client Encryption and SAP Logon
Tickets. With SNC Client Encryption, the combination with Logon Tickets does no longer
require a license.
However!
• Combining SNC Client Encryption with Logon Tickets is not a valid alternative for single
sign-on solutions based on Kerberos or X.509 certificates
• As Logon Tickets are cookies, there are multiple ways to attack them, e.g. using vulnerable
servers or browsers
• Logon Tickets have a very broad validity, so attacks on Logon Tickets may have severe
consequences
SAP recommends that customers rely on more secure technologies whenever implementing
single sign-on!
© 2022
2017-05 SAP SE. All rights reserved. 1163
SNC Client Encryption – Do it!
SNC Client Encryption 2.0: Supported Clients
Previous status
Update
© 2022
2017-05 SAP SE. All rights reserved. 1164
SNC Client Encryption – Do it!
SNC Client Encryption 2.0: Support a TLS-like enablement of encryption
Previous status
Update
✓ SNC Client Encryption 2.0 will establish an encrypted connection to a backend system based on a
trusted server certificate
© 2022
2017-05 SAP SE. All rights reserved. 1165
SNC Client Encryption – Do it!
SNC Client Encryption 2.0: Shipment
• Windows version available as of April 2017 from the SAP Software Download Center
Section „SNC CLIENT ENCRYPTION 2.0“ in „Installations & Upgrades“
© 2022
2017-05 SAP SE. All rights reserved. 1166
SNC Client Encryption – Do it!
Architecture using Kerberos
While Kerberos is given in standard Microsoft Domain landscapes, it requires that clients and users
are members of the respective domain. However, at least the servers do not need to be domain
members.
© 2022
2017-05 SAP SE. All rights reserved. 1167
SNC Client Encryption – Do it!
Architecture using signed server certificates in version 2.0
Encrypted connection with
authentication based on
GUI Client ABAP System with
Userid/Password or SAP Logon Ticket
with CA certificate private key and signed
and SNC names for server certificate in
ABAP systems transaction STRUST
One historical problem with enforcing SNC is that if you activated it to be required, SAP could
no longer sign on to your system to provide support. Has this issue been resolved?
✓ The local SAPGUI installation on clients owned by SAP is not trusted by your environment,
therefore SAP support cannot connect with SNC. This means you can enable SNC but you
cannot enforce it for all connections. This requires to set snc/only_encrypted_gui = 0
✓ Using snc/accept_insecure_gui = U you can define a (short) list of users who are allowed
to connect without SNC.
© 2022
2017-05 SAP SE. All rights reserved. 1169
SNC Client Encryption – Do it!
Questions
For SNC, is there an easy way to force users to use it and is there documentation somewhere?
➢ Use Logon Pad or central XML Configuration File on Server and disable editing of
connection entries.
SAP GUI for Windows 7.40 Administration Guide
https://www.sap.com/documents/2014/10/5c33d352-5a7c-0010-82c7-eda71af511fa.html
Chapter 7 Registry Values and Read-Only Feature of SAP GUI Options Dialog
Notes:
Note 2107181 - SAP Logon (Pad) 7.40: Collective SAP Note regarding SAP UI Landscape format
Note 2075150 - SAP Logon (Pad) 740: New format of configuration files as of SAP GUI for Windows 7.40
Note 2075073 - SAP Logon (Pad) 740: create/distribute server configuration file in the SAP UI landscape format
Note 2175351 - SAP Logon (Pad) 740: create/distribute the administrative core configuration file in the SAP UI landscape format
© 2022
2017-05 SAP SE. All rights reserved. 1170
SNC Client Encryption – Do it!
Questions
How can we check if connections are encrypted?
➢ The transactions SM04 and AL08 show currently active connections, however, you do not
find information about SNC status easily.
You can use a custom variant of SM04 which shows the SNC status, too: Get report
ZSM04000_SNC
➢ You can uns the SMOD / CMOD user exit after logon SUSR0001 to check the status using
function SNC_GET_MY_INFO and store the result in a custom table.
➢ You can use the Security Audit Log (SM19 / SM20) message BUJ to log unencrypted
communication for SAPGUI and RFC (prerequisite note 2122578 etc).
© 2022
2017-05 SAP SE. All rights reserved. 1171
SNC Client Encryption – Do it!
References about version 2.0
In case you encounter problems when installing, upgrading or running SNC CLIENT ENCRYPTION 2.0, report an
incident using component BC-IAM-SSO-CCL
© 2022
2017-05 SAP SE. All rights reserved. 1172
SNC Client Encryption – Do it!
References about version 1.0
© 2022
2017-05 SAP SE. All rights reserved. 1173
Note 2443673 - Filter Incoming Serialization Data (JVM)
Recommendations:
➢ Patch the JVM regularly from SAP Service Marketplace. Unless you haven’t custom code in
your system, you don’t need to configure anything.
➢ For custom code, check whether you require additional filter patterns to be configured
according to JDK Enhancement-Proposal (JEP) 290 and Oracle's blog post.
A process-wide filter is configured via a system property or a configuration file. The system property,
if supplied, supersedes the security property value.
• System property jdk.serialFilter
• Security property jdk.serialFilter in conf/security/java.properties
A filter is configured as a sequence of patterns, each pattern is either matched against the name of a class in
the stream or a limit.
See Secure Coding Guidelines for Java SE, too.
© 2022
2017-05 SAP SE. All rights reserved. 1174
Note 2443673 - Filter Incoming Serialization Data (JVM)
You can verify the version of the JVM of a managed system in transaction LMDB in the SAP
Solution Manager:
© 2022
2017-05 SAP SE. All rights reserved. 1175
Note 2443673 - Filter Incoming Serialization Data (JVM)
You can verify the version of the JVM using Configuration Validation by checking configuration
item vmVersion within configuration store jstart.jvm
Limitation: For the operator >= you can only enter one target value, like 8.1.029 in this example:
(It seems that you need an additional leading space character “ 8.1.029” for the value low field.)
© 2022
2017-05 SAP SE. All rights reserved. 1176
Disable start of transactions with OKCode skipping the first screen
© 2022
2017-05 SAP SE. All rights reserved. 1177
Note 2062885 - SU01/SU10: New user documentation function
Note 2203672 - SU01/SU10: New user documentation function II
New tab about Documentation in transaction SU01
available as of SAP_BASIS 7.31 SP 15 (optimized in SP 17) and 7.40 SP 10 (optimized in SP 13)
The feature requires multiple notes for the Security Audit Log on SAP_BASIS 7.40 and 7.50:
© 2022
2017-05 SAP SE. All rights reserved. 1179
April 2017
Topics April 2017
© 2022
2017-04 SAP SE. All rights reserved. 1181
SAP Support Portal – What’s New?
Notifications and SAP EarlyWatch Alert in the cloud
Highlights of the April 2017 Launchpad Release
On April 6th, 2017, many new features went live, some of them after successful tests with pilot customers, all of
them based on your feedback:
The Notification Area gives you an overview of notifications from various sources, such as your incidents or
important SAP Notes.
Documents stored in the redesigned SAP Help Portal can now be found through the central launchpad search.
The new application My SAP EarlyWatch Alert Reports provides the complete SAP EarlyWatch Alert report for
ABAP on SAP HANA systems.
For pilot customers: SAP Notes and KBAs that are opened in new browser windows or tabs got a new stand-alone
layout.
For pilot customers: Reports allow you to check the authorizations of users.
Learn more by clicking through the following pages. All changes are listed in our April 2017 release notes.
© 2022
2017-04 SAP SE. All rights reserved. 1182
SAP Support Portal – What’s New?
Notifications
Notifications
Notifications offer you access to system-driven information that helps you become aware of critical real-time
information. After a successful pilot phase, the SAP ONE Support Launchpad notification area has now become
available to all visitors. It is the place where you can get an overview of notifications from various sources, such as
your incidents or important SAP Notes, and take immediate action. Notifications can be sorted and grouped by
date, priority, or application. If activated, notifications can call your attention to
• Incident status changes
• Changed SAP Notes or Knowledge Base Articles that you had marked as favorites
• New matches for one of your saved Expert Search queries
You can manage your notifications and select the applications you are interested in. Furthermore, for favorite
notes and Expert Search results, you can opt in to receive e-mail notifications. Please make sure to maintain your
user profile and specify an e-mail address.
Blog: SAP HotNews, Security or Legal Change Notes – Get notified about basically anything
https://blogs.sap.com/2017/04/27/sap-hotnews-security-or-legal-change-notes-get-notified-about-basically-everything/
© 2022
2017-04 SAP SE. All rights reserved. 1183
SAP Support Portal – What’s New?
Notifications at Notes Expert Search
Frank Buchholz
© 2022
2017-04 SAP SE. All rights reserved. 1184
SAP Support Portal – What’s New?
SAP EarlyWatch Alert in the cloud (for SAP HANA systems)
My SAP EarlyWatch Alert Reports: You can read the EWA report in a complete new format that can
be personalized with favorite systems and favorite topics. All details on alerts and recommendations
are provided. The EWA Chapter about Security is included!
SAP EarlyWatch Alert – Analytical Dashboard: You can gain an overview on the system status with
the most important KPIs from your SAP ABAP system and the SAP HANA database. KPI history of up
to 12 months is available in drill-downs. (No security specific KPIs)
You require the SAP ONE Support Launchpad authorization “Service Reports & Feedback” to see data
in these applications for the systems of the customer numbers to which your S-user is assigned.
To request it, contact one of your company's user administrators.
Either add the two new tiles to your SAP One Support Launchpad or use these direct links to the
applications:
https://launchpad.support.sap.com/#/ewaviewer
https://launchpad.support.sap.com/#/ewadashboard
© 2022
2017-04 SAP SE. All rights reserved. 1185
SAP Support Portal – What’s New?
My SAP EarlyWatch Alert Reports (for SAP HANA systems)
The application My SAP EarlyWatch Alert Reports provides the complete SAP EarlyWatch Alert
report for ABAP on SAP HANA systems (and systems having an additional database connection to a
separate SAP HANA database). You can easily monitor the alerts and find out how to improve the
system stability, performance or security.
• Check the ratings for those systems for which an SAP EarlyWatch Alert service is active.
• Check the SAP EarlyWatch Alert report for a system and the ratings of its topic or subtopic.
• In a topic or subtopic, view detailed information.
• Use favorites to keep track of the systems you want to monitor frequently, or of the topics and subtopics you
visit often.
• Customize your views through a variety of sorting, grouping and filter criteria, e.g. the rating or the reports'
generation date.
© 2022
2017-04 SAP SE. All rights reserved. 1186
SAP Support Portal – What’s New?
My SAP EarlyWatch Alert Reports (for SAP HANA systems)
PR9
1234567890
© 2022
2017-04 SAP SE. All rights reserved. 1187
SAP Support Portal – What’s New?
My SAP EarlyWatch Alert Reports (for SAP HANA systems)
PR9
© 2022
2017-04 SAP SE. All rights reserved. 1188
SAP Support Portal – What’s New?
My SAP EarlyWatch Alert Reports (for SAP HANA systems)
PR9
© 2022
2017-04 SAP SE. All rights reserved. 1189
Note 2407616 - Remote Code Execution vulnerability in SAP GUI
Note 1768979 - Changes to the SAP GUI security rules file saprules.xml
© 2022
2017-04 SAP SE. All rights reserved. 1192
Note 2407616 - Remote Code Execution vulnerability in SAP GUI
Note 1768979 - Changes to the SAP GUI security rules file saprules.xml
© 2022
2017-04 SAP SE. All rights reserved. 1193
Note 2407616 - Remote Code Execution vulnerability in SAP GUI
Note 1768979 - Changes to the SAP GUI security rules file saprules.xml
All releases of the SAP GUI are affected. You can use this updated file saprules.xml for old
releases 7.20 or 7.30 of the SAP GUI, too.
You have to enable the Security Module of the SAP GUI to get any protection – this usually
requires that you have collected and optimized “Administrator” rules first, which prevent that
your users get annoyed by numerous popups (which simply would train them to click on
“Allow” always).
It is not sufficient for users to add private “User” rules which deny the execution of the registry
programs – you have to get rid of the false “Administrator” rules or change them into “Deny”
rules.
You do not need to update the complete SAP GUI installation. It would be sufficient to prepare
and distribute a new version of file saprules.xml either based on the version which is
available as an attachment of note 1768979 or which is part of the SAP GUI as of release 7.40
patchlevel 12. Ensure to include your existing own “Administrator” rules.
Caution: The false “Administrator” rules are removed, which means that users usually get a
popup asking for „Allow“ or „Deny“. You may want to use explicit „Deny“ rules instead.
© 2022
2017-04 SAP SE. All rights reserved. 1195
Note 2407616 - Remote Code Execution vulnerability in SAP GUI
Note 1768979 - Changes to the SAP GUI security rules file saprules.xml
▪ Administrator Rules
%ProgramFiles(x86)%\SAP\FrontEnd\SAPgui = C:\Program Files (x86)\SAP\FrontEnd\SAPgui
▪ User Rules
%APPDATA%\SAP\Common = C:\Users\<..>\AppData\Roaming\SAP\Common\
You might want to collect the User Rules from an educated group of your users to produce
Administrator Rules which match to the requirements of all users in your organization.
System Recommendations does not show this note for any system because the software
component BC-FES-GUI is not part of the technical ABAP system.
© 2022
2017-04 SAP SE. All rights reserved. 1196
Note 2407616 - Remote Code Execution vulnerability in SAP GUI
Note 1768979 - Changes to the SAP GUI security rules file saprules.xml
Conclusion:
➢ If you (= all users in your organization) are already using the Security Module of the
SAP GUI, you should update the SAP GUI client installation respective replace file
saprules.xml
➢ If you (= no or not all users in your organization) do not use the Security Module of the
SAP GUI yet, you should consider to run a security optimization project to prepare
“Administrator” rules for your organization and to enforce that the Security Module gets
activated
© 2022
2017-04 SAP SE. All rights reserved. 1197
Note 2456553 - Frequently Asked Questions on note 2407616
© 2022
2017-04 SAP SE. All rights reserved. 1198
What about SAPGUI for Java?
SAPGUI for Java is different and not affected by this vulnerability, however, there exist Security
Policy settings as well:
© 2022
2017-04 SAP SE. All rights reserved. 1199
Note 2458890 - SYSREC: support of SAP GUI security notes
System Recommendations does not show pure notes about the SAP GUI for any system because the
software component BC-FES-GUI respective the SP software component “SAP GUI FOR WINDOWS n.nn
CORE” is not part of the technical ABAP system.
https://support.sap.com/notes
→ Expert Search
Components (Exact): BC-FES-GUI
Document Type: SAP Security Note
Result: 37 Notes in total (some of them might be visible for ABAP systems
because they are assigned to other software components, too). You find 2 notes as of 2016:
© 2022
2017-04 SAP SE. All rights reserved. 1200
Note 2458890 - SYSREC: support of SAP GUI security notes
Notes with application component BC-FES-GUI are now shown for all ABAP systems as
“Support Package Independent” notes.
SolMan 7.1 no action required except
optional backup of user status and refresh
of cache, see note 2219377
SolMan 7.2 requires note 2458890 and
optional refresh of cache see note 2449853
© 2022
2017-04 SAP SE. All rights reserved. 1201
Note 2378090 - Missing Authorization check in Solution Manager
The authorization is required for the user running program /BDL/TASK_SCHEDULER in job
/BDL/TASK_PROCESSOR. You can see the user also in logs of transaction SDCCN.
Solution: Note 2330065 - ST-PI 740 SP05, ST-PI 2008_1_7xx SP15: Enhancements
Add an authorization for S_SDCC_ADD with SDCC_RUN_N = WRITE and SDCC_DEV_N = READ to the
existing role or assign the role SAP_SDCCN_ALL to the user.
© 2022
2017-04 SAP SE. All rights reserved. 1202
Notes 1329326 1616535 1823687 1914778 2012562 2045861
Server Information Disclosure
Note 1329326 - Configuration of server header in HTTP response
is/HTTP/show_server_header = false (default)
As a work-around, set parameters is/server_name (default: “SAP NetWeaver Application Server ”) and
is/server_version (default: Kernel release) to an arbitrary value.
Note 1616535 - Secure configuration of ICM for the ABAP application server
Note 1914778 - Potential information disclosure relating to HANA host names
is/HTTP/show_detailed_errors = false (default)
Note 2045861 - Hiding release information from the SMTP server banner
icm/SMTP/show_server_header = false
© 2022
2017-04 SAP SE. All rights reserved. 1203
Note 2423486 - Missing Authorization check in ADBC Demo
Install the note to protect several reports all belonging to report authorization group ADBC_Q
ADBC_DEMO
ADBC_DEMO_LOBS_ORA
ADBC_DEMO_METADATA
ADBC_QUERY
ADBC_TEST_CONNECTION
Take care about critical authorizations because report ADBC_QUERY still offers unrestricted
cross-client view on all database content (= cross-client version of SE16).
Instead of S_TABU_DIS / S_TABU_NAM following authorization checks are executed – treat this
combination s critical as S_TABU_DIS with full read-access (or deactivate the report):
© 2022
2017-04 SAP SE. All rights reserved. 1204
Note 2423486 - Missing Authorization check in ADBC Demo
© 2022
2017-04 SAP SE. All rights reserved. 1205
Note 2417355 - Missing Authorization check in RFC Maintenance
© 2022
2017-04 SAP SE. All rights reserved. 1206
March 2017
Topics March 2017
© 2022
2017-03 SAP SE. All rights reserved. 1208
Support Portal relaunch
The DSAG offers a Webinar about the new Support Portal on April 4th 2017 (English)
https://www.dsag.de/veranstaltungen/2017-04/webinar-neues-sap-support-portal
The SAP ONE Support Launchpad is not influenced by the new Support Portal.
https://launchpad.support.sap.com
© 2022
2017-03 SAP SE. All rights reserved. 1209
Support Tools for System Recommendations
Note 2427140 / 2423962 - SYSREC: Support tool for Solution Manager
Execution of Report:
1. Run report AGSNO_RPT_EASY_SUPPORT and choose the
system ID and the system type (e.g. ABAP or JAVA)
2. Save the generated xml file in your local directory.
You can inspect the xml file with any xml viewer.
3. Compress the xml file into a .zip file using the common
zip program
4. Create a support ticket on component SV-SMG-SR and
add the zip file as an attachment.
© 2022
2017-03 SAP SE. All rights reserved. 1210
Support Tools for System Recommendations
Note 2418578 - Report to batch download solution manager trace files
© 2022
2017-03 SAP SE. All rights reserved. 1211
Notes 2424120 2424173 2426260 2428811 2429069 about HANA
Blog on https://hana.sap.com/security
Helping Customers Keep Their SAP HANA Systems Secure – Latest Security Updates
Posted by Holger Mack in March 2017
https://blogs.saphana.com/2017/03/13/helping-customers-keep-their-sap-hana-systems-secure-latest-security-updates/
[…]
with the latest SAP Security Patch Day, on March 14th, 2017 SAP released five security notes for SAP
HANA.
Of the five security notes, only two are rated with a Very High and High criticality. These criticality
ratings indicate that affected customer systems could be at serious risk if an attacker exploits one of
these vulnerabilities. Both issues affect only customers who:
➢ Are running on a specific version of the SAP HANA software, or
➢ Have enabled and exposed an optional component that is disabled by default
We expect few SAP HANA customers to be affected by these issues.
© 2022
2017-03 SAP SE. All rights reserved. 1212
Notes 2424120 2424173 2426260 2428811 2429069 about HANA
Note 2424120 - Information disclosure in SAP HANA cockpit for offline administration
The improvements are included in SAP HANA revision 122.07 for SAP HANA 1.00 SPS 12 and revision 001 for SAP HANA 2.0 SPS 00.
The <sid>adm of an SAP HANA system is a very powerful user. Ensure that this user and the SAP HANA cockpit for offline administration are
secured and only usable in emergency situations.
Note 2424173 - Vulnerabilities in the user self-service tools of SAP HANA
The vulnerabilities have been fixed with revision 122.07 for SAP HANA 1.00 SPS 12 and revision 001 for SAP HANA 2.0 SPS 00.
Alternatively, the user self-services can be deactivated if the service is not needed or as temporary workaround.
Note 2426260 - SQL Injection vulnerability in SAP HANA extended application services, classic model
The vulnerability has been fixed with Revision 122.07 for SAP HANA 1.00 SPS 12 and Revision 001 for SAP HANA 2.0 SPS 00.
Workaround: Revoke the role "sap.hana.xs.formLogin::ProfileOwner" from users.
Note 2428811 - SQL Injection vulnerability in SAP HANA Web Workbench
The issue has been fixed with Revision 122.06 for SAP HANA 1.00 SPS 12 and Revision 001 for SAP HANA 2.0 SPS 00.
Note 2429069 - Session fixation vulnerability in SAP HANA extended application services, classic model
HANA 1.00 is not affected. The vulnerability has been fixed with revision 001 for SAP HANA 2.0 SPS 00
Vulnerability
The vulnerability allows an attacker to take control of the system. However, this affects only customers if the optional User Self
Service component (disabled by default) has been enabled and exposed to an untrusted network.
The solution is part of HANA 1.0 SPS12 (in maintenance) Revision 122.07
© 2022
2017-03 SAP SE. All rights reserved. 1214
Notes 2424173 - Vulnerabilities in user self-services of SAP HANA
1
3 4
2
© 2022
2017-03 SAP SE. All rights reserved. 1215
Notes 2424173 - Vulnerabilities in user self-services of SAP HANA
Workaround
➢ Disable user self-services as described in the note via
https://<hostname>:43<xx>/sap/hana/xs/admin/#/package/sap.hana.xs.selfService.user/sqlcc/selfService
➢ Block user self-service using an URL filter behind the TLS endpoint:
https://<hostname>:<port>/sap/hana/xs/selfService/user/requestAccount.html?...
https://<hostname>:<port>/sap/hana/xs/selfService/user/verifyAccount.html?...
© 2022
2017-03 SAP SE. All rights reserved. 1216
Note 1570399 - Solution Manager BI reporting (7.1)
This note contains SAP Standard Roles which get updated regularly.
This role (copied to a Z role) is assigned to user SM_EFWK automatically in SAP Solution
Manager Basic Configuration.
• Rerun the step „Maintain Users“ in SAP Solution Manager Basic Configuration
(or copy the role and assign it manually)
© 2022
2017-03 SAP SE. All rights reserved. 1217
Note 1570399 - Solution Manager BI reporting (7.1)
Click “Refresh” to
check the users
© 2022
2017-03 SAP SE. All rights reserved. 1218
Note 1570399 - Solution Manager BI reporting (7.1)
Click “Refresh” to
check the users
1
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE test [
External Entity Attacks allow an adversary to
<!ENTITY xxeattack SYSTEM "file:///etc/passwd"> disclose sensitive data stored on
]>
<xxx>&xxeattack;</xxx> filesystem and network level.
Furthermore, excessive resource
2 consumption is possible when accessing
razvan:x:1000:1000:razvan,,,:/home/razvan:/bin/bash special files and running XML bombs.
...
➔ Critical data leaked
Attacker ➔ Denial of service
© 2022
2017-03 SAP SE. All rights reserved. 1220
Notes 1594475 1712860 XML External Entities (XXE)
Solution concept (ABAP)
SAP NetWeaver ABAP provides the option of prohibiting Frontend
the use of a DTD in XML or activating a heuristic to (Browser, SAPGUI, RFC)
automatically identify a potential attack via an XML bomb:
Profile parameter:
ixml/dtd_restriction SAP NetWeaver Application Server ABAP
Values: none – no DTD restriction
expansion – expansion of XML is limited* ABAP runtime environment
© 2022
2017-03 SAP SE. All rights reserved. 1222
Note 2433458 - Missing Authorization check in ABAP Debugger
Blogs:
© 2022
2017-03 SAP SE. All rights reserved. 1224
Note 2088593 - Potential disclosure of persisted data in LO-MD-BP
Recommendation: Implement the note and activate the SACF and SLDW scenarios but adjust
authorization roles and maintain the allowlist only if you are using these functions via RFC.
You can use the Workload Statistics (Transaction ST03N) → RFC Profiles
or transaction STRFCTRACE to verify if these functions are used in RFC scenarios (or you use
report ZRFC_STATRECS_SUMMARY).
© 2022
2017-03 SAP SE. All rights reserved. 1225
Note 2088593 - Potential disclosure of persisted data in LO-MD-BP
Transaction ST03N
(no specific prerequisites)
Transaction STRFCTRACE
(Verify prerequisites as described in the information)
© 2022
2017-03 SAP SE. All rights reserved. 1226
February 2017
Topics February 2017
© 2022
2017-02 SAP SE. All rights reserved. 1228
System Recommendations failure – solved as of 21.02.2017
Currently almost all Security Notes and HotNews are added to the list and
labeled falsely as “Release Independent Notes.
This happensThe issue
because of aniserror
solved!
in the SAP Backbone which calculates the
results for System Recommendations.
Please
→ Ignore restart
System the background
Recommendations job
until SAP has fixed the SAP Backbone
SM:SYSTEM RECOMMENDATIONS, e.g. by copying an older
job and schedule the new job „immediately“. The wrongly
shown Security Notes and HotNews are removed.
The application log, transaction SLG1 for log object AGS_SR,
shows the removal of the superfluous notes.
Status values which you might have entered into
System Recommendations are not touched.
© 2022
2017-02 SAP SE. All rights reserved. 1229
Note 2418823 - Update 1 to Note 2319506
© 2022
2017-02 SAP SE. All rights reserved. 1230
Note 2418823 - Update 1 to Note 2319506
Is the vulnerability limited to ORA? (Can I omit implementation in case of other databases?)
Yes, because of tests like this:
IF SY-DBSYS(3) <> 'ORA'.
RAISE WRONG_DATABASE.
ENDIF.
… but this test is commented in one of the functions.
Yes, because the following fails if ORA specific table V$INSTANCE does not exists:
EXEC sql .
select instance_name
into :localdbname
from V$INSTANCE
ENDEXEC .
… but I do not like to rely on this in case of very critical INSERT REPORT … PERFORM IN PROGRAM …
Implement such corrections in any case.
© 2022
2017-02 SAP SE. All rights reserved. 1231
Note 2413716 - Setup of Trusted RFC in GRC Access Control EAM
This how-to note (which is based on updated material from this webinar from October 2016)
replaces and corrects old note 1694657.
To secure Trusted RFC for GRC Access Control EAM you should execute following
configuration changes:
1. Enhance the trust relationship to transmit the transaction code of the calling transaction
2. Maintain authorizations for authorization object S_RFCACL in managed systems
3. Adjust RFC destinations to utilize the authorization object S_ICF to secure the usage of RFC
destinations
4. Deactivate the password of FFIDs
5. Strictly control critical basis authorizations for managing trust relationships and RFC destinations
6. Restrict authorizations for S_RFC included in SAP roles from GRC
See Blog: Secure Trusted RFC in GRC Access Control EAM and other Applications
https://blogs.sap.com/2017/02/14/secure-trusted-rfc-in-grc-access-control-eam-and-other-applications
© 2022
2017-02 SAP SE. All rights reserved. 1232
Note 2374165 - Missing Authorization check in BW-BPS
This is just another example about potential critical functions and methods which could be
misused if you do not control development authorizations.
➢ strictly control access to SE37 and to authorizations for S_DEVELOP for object type FUGR and
activity 16 = execute (and all change activities)
➢ strictly control access to SE24 and to authorizations for S_DEVELOP for object type CLAS and
activity 16 = execute (and all change activities)
© 2022
2017-02 SAP SE. All rights reserved. 1233
Note 2405256 - PFCGMASSVAL: Adding a manual authorization
© 2022
2017-02 SAP SE. All rights reserved. 1234
KBA 2253549 - The SAP Security Baseline Template & ConfigVal
An SAP Security Baseline is a regulation on minimum security requirements to be fulfilled for all SAP
systems in your organization.
"Baseline" means: These requirements must be fulfilled by all SAP systems regardless of any risk
assessments. They are general best practices and apply to all systems, regardless of their security
level.
The SAP Security Baseline Template is a template document provided by SAP on how an
organization-specific SAP Security Baseline could be structured. It is pre-filled with selected baseline-
relevant requirements and corresponding concrete values as recommended by SAP.
https://support.sap.com/sos
→ Media Library
CoE Security Services - Security Baseline Template Version
https://support.sap.com/dam/library/SAP%20Support%20Portal/support-programs-services/support-
services/security-optimization-service/media/Security_Baseline_Template.zip.
© 2022
2017-02 SAP SE. All rights reserved. 1235
KBA 2253549 - The SAP Security Baseline Template & ConfigVal
© 2022
2017-02 SAP SE. All rights reserved. 1236
January 2017
Topics January 2017
© 2022
2017-01 SAP SE. All rights reserved. 1238
News from SAP Support Portal – Filter for Security Notes
• New Filters: The Expert Search in the My SAP Notes & KBAs application now features even more filter
options:
• Document Type with the options SAP Notes, SAP Knowledge Base Articles, SAP Security Notes, and SAP Partner Notes;
• SAP Security Patch Day with the options Patch Day SAP Security Notes and Support Package SAP Security Notes.
• Using these filters (in combination with others like Priority), you can easily identify SAP HotNews, SAP Security Notes,
SAP Legal Change Notes and more and save these queries (as so-called “variants”) for future reuse.
• The status handling for work lists has been improved: It is possible to move for example an Security
Note from status ‘Confirmed’ back to status ‘To Be Reviewed’
• The comma-separated value (CSV) file that you can download to your local computer now includes
the URLs to the notes in the list.
© 2022
2017-01 SAP SE. All rights reserved. 1239
News from SAP Support Portal – Filter for Security Notes
https://support.sap.com/notes → Expert Search
© 2022
2017-01 SAP SE. All rights reserved. 1240
System Recommendations – Silent migration to new SAP backbone
Due to technical reasons SAP starts a silent, staged migration to a new SAP backbone which
calculates results for System Recommendations.
The old backbone does not get information about latest Support Packages anymore which lead
to incorrect results (too many notes = false-positive). Example: After upgrading a system to
SAP_BASIS 7.20 SP 16, which was recently released to customers in November 2016, you see
several superfluous notes in System Recommendations.
Please raise a ticket on component SV-SMG-SR if you face any issues about
© 2022
2017-01 SAP SE. All rights reserved. 1241
How to analyze unimportant updates
Note 2319172 - Whitelist based Clickjacking Framing Protection in SAP GUI for HTML
➢ No change
© 2022
2017-01 SAP SE. All rights reserved. 1242
Note 2379540 - User defined HTTP logging with TLS information
© 2022
2017-01 SAP SE. All rights reserved. 1243
Note 2379540 - User defined HTTP logging with TLS information
Example:
icm/HTTP/logging_2 = PREFIX=/,LOGFILE=ssl_info.log,LOGFORMAT=%a %y1 %y2
This could lead to following log entries (the 1st line shows a non-encrypted connection):
10.97.12.81 - -
10.97.12.81 TLSv1.0 TLS_RSA_WITH_AES128_CBC_SHA
10.97.10.26 TLSv1.2 TLS_ECDHE_RSA_WITH_AES128_CBC_SHA
10.97.10.26 TLSv1.2 TLS_ECDHE_RSA_WITH_AES128_GCM_SHA256
Documentation of placeholders for profile parameter icm/HTTP/logging_<xx>
https://help.sap.com/saphelp_nw75/helpdata/en/48/442541e0804bb8e10000000a42189b/frameset.htm
© 2022
2017-01 SAP SE. All rights reserved. 1244
Note 2379540 - User defined HTTP logging with TLS information
Proposal (If the string is too long for entering it in RZ10, then maintain the profile file directly):
icm/HTTP/logging_0 =
PREFIX=/,
LOGFILE=access-$(SAPSYSTEMNAME)-$(SAPLOCALHOST)-%y-%m-%d.log,
MAXSIZEKB=1500000,SWITCHTF=day,
LOGFORMAT=%t %a %y1 %y2 %u "%r" %s %b %L %{Host}i %w1 %w2
Explanation:
%t Time specification in CLF format: [15/Dec/2007:16:18:35 +0100]
%a IP address of the remote host (this might the a load balancer, therefore we add placeholder %{Host}i )
%y1 TLS protocol version (only useful if SSL termination happens here)
%y2 TLS cipher suite as string (only useful if SSL termination happens here)
%u User name of a basic authentication or the "common name“ of an X.509 certificate
%r First line of an HTTP request with the original path and form fields
%s OK code of the response
%b Length of the response in bytes
%Lms The duration of a request in milliseconds (followed by “ms”
%{Host}i Name of a request header field
%w1 SID of the back-end system (from wdisp/system) to which an HTTP request was sent.
%w2 Instance of the back-end system to which an HTTP request was sent.
© 2022
2017-01 SAP SE. All rights reserved. 1245
Note 2265385 - Switchable authorization checks for RFC in Product
Catalog
Step 5: Maintain RFC Function Modules
default values using transaction SU22/SU24
… instructions for many functions …
© 2022
2017-01 SAP SE. All rights reserved. 1246
Note 2265385 - Switchable authorization checks for RFC in Product
Catalog
Another option is to find and analyze existing roles containing these
authorization objects.
© 2022
2017-01 SAP SE. All rights reserved. 1247
Overview about Authorization Trace Options
© 2022
2017-01 SAP SE. All rights reserved. 1248
Note 1854561 - Authorization trace with filter
© 2022
2017-01 SAP SE. All rights reserved. 1249
Note 2220030 - STUSERTRACE: User trace for authorization checks
The long-term trace collects data for all clients and all users and stores it in the database.
It is available as of SAP_BASIS 7.40 SP 14 or 7.50 SP 02 and requires Kernel 7.45 patch 112.
Note 2220030 is required to activate the transaction on the lowest of these SP.
During the execution of a program, each authorization check is recorded with the name and type of the
running application, the location in the program, the authorization object, the checked authorization
values, and the result exactly once for each user. This is done with the first time stamp.
You can activate the trace either completely or only for selected authorization checks using a filter
indicator. Application type, user, and authorization objects can be used as filters. In this way, you can
examine special scenarios, such as RFC programs or batch jobs, over a longer period of time.
© 2022
2017-01 SAP SE. All rights reserved. 1250
Note 2220030 - STUSERTRACE: User trace for authorization checks
Note 2220030 is required to activate the transaction on the lowest of these SP:
© 2022
2017-01 SAP SE. All rights reserved. 1251
Note 2220030 - STUSERTRACE: User trace for authorization checks
Fiori App
OData Service
© 2022
2017-01 SAP SE. All rights reserved. 1252
Note 2220030 - STUSERTRACE: User trace for authorization checks
Result for calling the Fiori Launchpad and the Fiori App System Recommendations
© 2022
2017-01 SAP SE. All rights reserved. 1253
December 2016
Topics December 2016
© 2022
2016-12 SAP SE. All rights reserved. 1255
SAP to become a CVE Naming Authority for SAP issues
Tentative Proposal
Proposal – For
Soenke Eggers Customer Feedback
© 2022
2016-12 SAP SE. All rights reserved. 1256
Common Vulnerabilities and Exposures (CVE)
CVE’s common identifiers enable data exchange between security products and provide a baseline
index point for evaluating coverage of tools and services.
The MITRE Corporation maintains CVE, manages the compatibility program, oversees the CVE
Numbering Authorities (CNA), and provides impartial technical guidance to the CVE Editorial Board
throughout the process to ensure CVE serves the public interest.
MITRE is a not-for-profit organization that operates research and development centers sponsored by
the United States federal government.
© 2022
2016-12 SAP SE. All rights reserved. 1257
A CVE entry example
© 2022
2016-12 SAP SE. All rights reserved. 1258
Define CNA
CVE Numbering Authorities (CNAs) are major OS vendors, security researchers, and research
organizations that assign CVE Identifiers to newly discovered issues without directly involving
MITRE in the details of the specific vulnerabilities, and include the CVE Identifiers in the first public
disclosure of the vulnerabilities.
Some Software Vendors who are CNAs for their own issues
© 2022
2016-12 SAP SE. All rights reserved. 1259
Not every software vendor is a CNA…but
https://cve.mitre.org/cve/data_sources_product_coverage.html
© 2022
2016-12 SAP SE. All rights reserved. 1261
When we do not submit, our researchers do…
Researchers control
how to describe a
SAP vulnerability.
© 2022
2016-12 SAP SE. All rights reserved. 1262
Always point to the researcher’s blog in CVE…
© 2022
2016-12 SAP SE. All rights reserved. 1263
Stacking up the numbers…in 2015
217
62 (29%)
Patch
CVE
Day
Entries
Notes
© 2022
2016-12 SAP SE. All rights reserved. 1264
Our customers and researchers demand change
- Just some examples
Citi has a requirement for all vendors to follow Responsible
Vulnerability disclosure as described within the Citi Information
Security Standards (CISS). All vendors must follow these
disclosure processes to notify the global public of vulnerability
releases as outlined in the links below. Once these procedures are
followed, our content provider can then collect this data and
provide to us. Privately disclosing vulnerabilities creates
exponential amounts of unnecessary work for everyone in Citi
because this information is not freely available.
- Citi escalation to SAP in regards to our ‘lack of’ CVE submission
© 2022
2016-12 SAP SE. All rights reserved. 1265
Our customers and researchers demand change
- Just some examples
After the issue will be resolved it is possible to ask MITRE for a CVE-ID?
It is very important for me to have it for my resume.
- A researcher’s response after SAP confirmation of his reported
vulnerability.
© 2022
2016-12 SAP SE. All rights reserved. 1266
Anticipated benefit of adopting CVE
Allow SAP to scale out vulnerability management (e.g. cloud data centers)
© 2022
2016-12 SAP SE. All rights reserved. 1267
To summarize…
5. We expect the adoption of CVE will increase awareness of SAP security patches and customer
satisfaction
By moving to CVE:
1. We want to be transparent.
Vic Chung
[email protected]
2016-12
Transparent Software Vulnerability Disclosure
SAP as a CVE Naming Authority
Common Vulnerabilities and Exposures
© 2022
2016-12 SAP SE. All rights reserved. 1270
Transparent Software Vulnerability Disclosure
SAP as a CVE Naming Authority
Common Vulnerabilities and Exposures (CVE) is an industry standard in sharing information on software vulnerabilities
© 2022
2016-12 SAP SE. All rights reserved. 1271
Patch Day Notes vs. Support Package Implementation Notes
(reloaded)
Patch Day Notes
SAP Security Notes mostly published on
Security Patch Day
Contain very important security corrections
or
address security issues reported from external sources
Have CVSS scoring in most cases
Re-classification in March 2016
SPIN covering “minor, medium or high”
SPIN might be published on Patch Day dates as well! external sources and internal findings with priority “Very High”.
* Support Package Security Notes fix vulnerabilities found internally with
priority “Low”, “Medium” and “High”.
© 2022
2016-12 SAP SE. All rights reserved. 1273
Patch Day Notes vs. Support Package Implementation Notes
(reloaded)
Are Support Package Implementation Notes really
New strategy as of End of 2012:
Publish "Patch Day Notes" but different … as soon as they are published?
restrict publication of "Support
Package Notes"
➔
Use Priority, CVSS, and risk assessment to judge
about notes but don’t use the type as a major
differentiator.
The “SAP HANA cockpit for offline administration” is a tool to solve emergency issues only
which only should be used if HANA is offline. In such a case it’s acceptable to login using the
very powerful <sid>adm user.
This user has access to all server-local resources of the SAP HANA system. Only the
emergency administrators of the database should know the credentials of this user. A user who
knows the password of the <sid>adm user can directly log into the server at operating system
level.
During normal operation administrators can use the HANA Studio using their personal users
instead to view trace files of the database.
© 2022
2016-12 SAP SE. All rights reserved. 1275
Authorizations for SAP Solution Manager RFC users
The template roles SAP_SOLMAN_READ and SAP_SOLMAN_TMW for the managed systems and the
role SAP_SOLMAN_BACK for the SAP Solution Manager are updated regularly. In addition to
extensions which are required to run new scenarios, we reduce the authorizations, too, omiting
critical authorizations which are not needed (anymore).
Review the notes regularly and use transaction SOLMAN_SETUP to update your Z-roles:
➢ Note 2257213 - Authorizations for RFC users as of SAP Solution Manager 7.2 SP02
➢ Note 1830640 - Authorizations for SAP Solution Manager RFC users 7.1 SP09
Comments:
• The SP assignment in note 1989587 seems to be wrong as the new report is available as of SP 16.
• The profile parameter gw/display_acl_new (with values 0 / 1) and the Kernel patch mentioned in note 1989587 do not seem to be important.
© 2022
2016-12 SAP SE. All rights reserved. 1277
How to manage RFC Gateway Access Control lists
as of SAP_BASIS 7.40
Project plan:
© 2022
2016-12 SAP SE. All rights reserved. 1279
How to manage RFC Gateway Access Control lists
as of SAP_BASIS 7.40
© 2022
2016-12 SAP SE. All rights reserved. 1280
How to manage RFC Gateway Access Control lists
as of SAP_BASIS 7.40
Hints:
© 2022
2016-12 SAP SE. All rights reserved. 1281
How to manage RFC Gateway Access Control lists
as of SAP_BASIS 7.40
You see the count for consolidated connects and
failed connect attempts and if the connect was
successful because of simulation mode.
© 2022
2016-12 SAP SE. All rights reserved. 1282
How to manage RFC Gateway Access Control lists
as of SAP_BASIS 7.40
Now you can copy an entry from the
log to the ACL file and adjust the rule.
© 2022
2016-12 SAP SE. All rights reserved. 1283
How to manage RFC Gateway Access Control lists
as of SAP_BASIS 7.40
© 2022
2016-12 SAP SE. All rights reserved. 1284
How to manage RFC Gateway Access Control lists
as of SAP_BASIS 7.40
© 2022
2016-12 SAP SE. All rights reserved. 1285
How to manage RFC Gateway Access Control lists
in older ABAP releases or in Java
The same profile parameters, ACL files, and log files are used in ABAP releases below SAP Basis 7.40
or in Java, however, you have to analyze the logs manually to find necessary ACL entries.
Keep in mind that you only need ACL entries in secinfo or reginfo if the caller is external relative to
the current system. All servers which belong to the current system are covered by the internal rule.
Hints:
• Selection of files should work if you use the standard proposal LOGFILE=gw_log-%y-%m-%d as
well if you use the proposal from the RFC Whitepaper
LOGFILE=gw_log_$(SAPSYSTEMNAME)_$(SAPLOCALHOST)_%y-%m-%d
It might be the case that you need a correction via note
• On a sandbox you could use RZ11 to change the value of gw/logging temporarily to access
different files which you have copied from other servers into the folder of DIR_HOME of this sandbox
© 2022
2016-12 SAP SE. All rights reserved. 1286
How to manage RFC Gateway Access Control lists
Dynamic Log Settings: SMGW → Goto → Expert functions → Logging
ACTION=…
T P
X O
S C
Ss E
Z R
M V
SWITCHTF=[hour|day|week|year] MAXSIZEKB=on
MAXSIZEKB=<value>
Related tools:
Report RSGWREGP lists currently gateway-registered external server programs
Report RSGWRLST lists all RFC Gateways addressed by this system
Report RSMONGWY_REGINFO creates ACL File for registered servers
Report RSMONGWY_SECINFO creates ACL File for started servers
Configuration Validation
Configuration Store ABAP_INSTANCE_PAHI to validate profile parameters
Configuration Store GW_REGINFO
Configuration Store GW_SECINFO
© 2022
2016-12 SAP SE. All rights reserved. 1288
November 2016
Topics November 2016
News about the Support Launchpad: How to define the filter for Security Notes
SAP Solution Manager 7.2 - What's new in Configuration Validation
Note 2288631 - Fixes in CommonCryptoLib 8.5.4
Note 2356480 - GW: Several Fixes in RFC Gateway
Note 2367193 - Missing Authorization check in Cash Flow Statement report
Note 2197830 - Missing authorization check in Account Management
Note 2368873 - Missing Authorization check in Banking Services / Standing Order
© 2022
2016-11 SAP SE. All rights reserved. 1290
News about the Support Launchpad: How to define the filter for
Security Notes
Prerequisites:
• Connect Systems to the SAP Support Portal
• Ensure to have enabled “Automated Update” of data
(for example through an SAP EarlyWatch Alert
service).
• Ensure to see up-to-date information about
• Product Versions & Usage Types
• Kernel
• Software Component Version and Support Packages
© 2022
2016-11 SAP SE. All rights reserved. 1291
News about the Support Launchpad: How to define the filter for
Security Notes
Now you can choose Systems from the Favorites at
“SAP Security Notes”:
© 2022
2016-11 SAP SE. All rights reserved. 1292
SAP Solution Manager 7.2 SP 3
What's new in Configuration Validation
In a nutshell: We basically kept Configuration Validation as in SAP Solution Manager 7.1.
➢ New Configuration Stores in CCDB Content / Monitoring and Alerting
• LOCKED_TRANSACTIONS
• VSCAN_GROUP, VSCAN_SERVER
• GLOBAL_CHANGE_LOG, COMPONENTS_CHANGE_LOG, NAMESPACE_CHANGE_LOG,
AUTH_PROFILE_USER_CHANGE_DOC
• SYSTEM_TIMEZONE
• SAPUI5_LIBS, SAPUI5_VERSION
• Java: critical group and role assignments, critical user names, critical actions in roles
➢ Configuration Validation UI
➢ BW Reporting Templates allow strings up to 250 chars
➢ Reporting Directory including Bookmarks
➢ Comparison Lists
➢ Implemented a Badi to build dynamic comparison lists based on customer attributes. See note 2365039
➢ Fiori Launchpad
➢ Using SAP Solution Manager 7.2 Launchpad navigate to group Root Cause Analysis
or to group SAP Solution Manager Administration
© 2022
2016-11 SAP SE. All rights reserved. 1293
Note 2288631 - Fixes in CommonCryptoLib 8.5.4
CommonCryptoLib default configuration does no longer support 3DES because 3DES was
downgraded to configuration string "MEDIUM".
For any version of CommonCryptoLib you can block 3DES if you append !e3DES to your
current cipher suite string, e.g. HIGH:!e3DES
So far there does not exist a log option to show which cipher suites are actually used. This is
going to become changed.
© 2022
2016-11 SAP SE. All rights reserved. 1294
Note 2356480 - GW: Several Fixes in RFC Gateway
Depending on the release and patch level of the Kernel, some of the flags are not used
(anymore). It does not matter if you set or not set these flags.
You can activate even higher flags to activate every future option. You would get a trace
message telling about it.
→ You can always use the value 255 to activate all flags, i.e. for newly installed systems.
Other notes:
Note 1444282 - gw/reg_no_conn_info settings
Note 2123405 - GW: gw/reg_no_conn_info in 74X kernel releases
Note 2269642 - GW: Validity of parameter gw/reg_no_conn_info as of kernel release 74X
© 2022
2016-11 SAP SE. All rights reserved. 1295
Note 2356480 - GW: Several Fixes in RFC Gateway
+8 1473017 Uppercase/lowercase in the files reg_info and sec_info not used not used
1480644 "gw/acl_mode" and "gw/reg_no_conn_info"
+16 not used
2123409 GW: reg_no_conn_info 16 for dynamic change
+32 1633982 ACCESS Option in reginfo file not used not used
© 2022
2016-11 SAP SE. All rights reserved. 1296
Note 2367193 - Missing Authorization check in Cash Flow Statement
report
Good news:
But:
© 2022
2016-11 SAP SE. All rights reserved. 1297
Note 2197830 - Missing authorization check in Account
Management
Bad news:
➢ Several prerequisites
© 2022
2016-11 SAP SE. All rights reserved. 1298
Note 2368873 - Missing Authorization check in Banking Services /
Standing Order
Transaction BCA_SO_CHANGE (Standing Order Change), and similar functions now run an
unconditional authorization check for authorization object F_SOR_TRT which checks for the
org. unit of the employee i.e. for users with active flag "employee authority check on account
level".
© 2022
2016-11 SAP SE. All rights reserved. 1299
October 2016
Topics October 2016
© 2022
2016-10 SAP SE. All rights reserved. 1301
News about the Support Launchpad and System Recommendations:
Released On = Latest change date
„SAP has changed its way to show release dates for Security Notes in the SAP Support
Launchpad Security Notes Search, compared to the old Support Portal Security Notes Search.
The Notes are now shown with the date of the last update SAP has released.”
The tool System Recommendations still show the first released as a security note dates known
from the Service Marketplace, but will change its result as soon as caches are resetted and
SysRec refreshes the calculation.
If a customer wants to base any information or reporting on the very date on which SAP has
first published a vulnerability, he may do so with own custom tools. He may also look into each
Note individually for the first released version, but this information is not reliable either.
Customers should not work with any “first released” date of Security Notes at all. They should
adapt their processes to consume the “last updated” date only.
© 2022
2016-10 SAP SE. All rights reserved. 1302
News about the Support Launchpad
Released On = Latest change date
© 2022
2016-10 SAP SE. All rights reserved. 1303
News about the Support Launchpad
Released On = Latest change date
© 2022
2016-10 SAP SE. All rights reserved. 1304
News about the Support Launchpad
Compare versions
© 2022
2016-10 SAP SE. All rights reserved. 1305
News about System Recommendations in SolMan 7.1
Note 2141744 - SysRec: manual status is lost and replaced with status 'new'
New version 4 from 28.07.2016
Limitation: This correction cannot give you status values back which you already have lost.
© 2022
2016-10 SAP SE. All rights reserved. 1307
News about the Security Community
http://go.sap.com/community/topic/security.html
ANNOUNCEMENT:The SCN space retired on October 10.
On October 10, a new community platform has replaced SCN. Spaces will not be part of this new
community experience. Instead, the community platform will categorize and consolidate content using
tags. In some cases, these tags will be associated with community topic pages dedicated to a specific
subject. Due to its popularity, the Security space has a dedicated community topic page, Security
Community, that will include highlights, related resources, and the latest blogs and questions about
security.
In addition, you'll be able to follow the associated tag “Security”. This will allow you to get notifications
whenever someone publishes content with this tag. You can also search for other tags and related
content on the Browse Community page:
Life (profile SAP_NEW), the Universe (role SAP_NEW) and Everything (SAP_ALL)
https://blogs.sap.com/2014/02/17/life-profile-sapnew-the-universe-role-sapnew-and-everything-sapall/
Analysis and Recommended Settings of the Security Audit Log (SM19 / SM20)
https://blogs.sap.com/2014/12/11/analysis-and-recommended-settings-of-the-security-audit-log-sm19-sm20/
How to get RFC call traces to build authorizations for S_RFC for free!
https://blogs.sap.com/2010/12/05/how-to-get-rfc-call-traces-to-build-authorizations-for-srfc-for-free/
© 2022
2016-10 SAP SE. All rights reserved. 1309
News about the Security Community
Other Blogs about Security
Why you should really get rid of old password hashes *NOW*
https://blogs.sap.com/2014/05/08/why-you-should-really-get-rid-of-old-password-hashes-now/
Configuration Validation
http://wiki.sdn.sap.com/wiki/display/TechOps/ConfVal_Home
© 2022
2016-10 SAP SE. All rights reserved. 1310
Note 2078596 - Further improvements for RFC security (reloaded)
Switchable authorization checks (SACF)
© 2022
2016-10 SAP SE. All rights reserved. 1311
Note 2078596 - Further improvements for RFC security (reloaded)
Switchable authorization checks (SACF)
The following SAP Notes contain new switchable authorization checks in RFC functions
October 2016:
2266687 CRM-BF Switchable authorization checks for RFC in CRM Counters
2255642 CRM-BF-BRF Switchable authorization checks for RFC in Rule Builder BRFplus
2276601 CRM-IM Switchable authorization checks for RFC in CRM-Sales of Subscription based Series
2248790 CRM-IM-IPM Switchable authorization checks for RFC in Intellectual Property Management
2265976 CRM-ISA Switchable authorization checks for RFC in Internet Sales
2265385 CRM-ISA-CAT Switchable authorization checks for RFC in Product Catalog
2252568 CRM-ISE Switchable authorization checks for RFC in Internet Service
2273147 CRM-IT-BTX Switchable authorization checks for RFC in CRM-IT-BTX
2258027 CRM-ITT-ETC-BTX Switchable authorization checks for RFC in CRM-Travel&Transportation-Electronic Toll Collection-Business Transaction
2271839 CRM-IU Switchable authorization checks for RFC in CRM-IU
2233831 CRM-LAM Switchable authorization checks for RFC in Leasing / Account Origination
2303421 CRM-LOY Switchable authorization checks for RFC in Loyalty Management (CRM-LOY)
2272055 CRM-MD-CON-XIF Switchable authorization checks for RFC in Conditions Master Data
2271802 CRM-MKT-EAL Switchable authorization checks for RFC in External List Management (CRM-MKT-EAL)
2262131 CRM-MSA Switchable authorization checks for RFC in CRM-MSA-ADP and CRM-MT-MAS-ARS
2261768 CRM-MW-ADM Switchable authorization checks for RFC in CRM-MW-ADM
2275009 CRM-MW-ADP Switchable authorization checks for RFC in CRM-MW-ADP
2264976 CRM-MW-BDM CRM_Switchable authorization checks for RFC in CRM-MW-BDM
2266040 CRM-MW-CCO Switchable authorization checks for RFC in CRM-MW-CCO
2264949 CRM-MW-GEN Switchable authorization checks for RFC in CRM-MW-GEN
2268252 CRM-MW-GWI-GWA Switchable authorization checks for RFC in CRM-MW-GWI-GWA
2270084 CRM-MW-MFW Switchable authorization checks for RFC in CRM-MW-MFW
2266967 CRM-MW-MON Switchable authorization checks for RFC in CRM-MW-MON
2264948 CRM-MW-SRV Switchable authorization checks for RFC in CRM-MW-SRV
© 2022
2016-10 SAP SE. All rights reserved. 1312
Note 2078596 - Further improvements for RFC security (reloaded)
Switchable authorization checks (SACF)
Install Note(s)
Install Application Activate Logging in the
Support Package or and Security Audit Log
Upload SACF
DUO DUP DUQ DUU DUV
Scenario
© 2022
2016-10 SAP SE. All rights reserved. 1314
Activate logging via Security Audit Log
for Switchable Allowlists (SLDW) and Authorization Checks (SACF)
Messages are only written if
the Security Audit Log is
active and the current filter
settings contain the required
messages. You can activate
and check this with
transaction SM19.
Choose ‘Detail Configuration’, DUL Check for &A in whitelist &B was successful
sort the entries, and select DUO Authorization check for object &A in scenario &B successful
messages DUL, DUM and DUN DUP Authorization check for object &A in scenario &B failed
for Switchable Allowlists DUU Authorization check for user &C on object &A in scenario &B successful
(SLDW) and DUO, DUU, DUP, DUV Authorization check for user &C on object &A in scenario &B failed
DUV, and DUQ for Authorization DUM Check for &A in whitelist &B failed
Checks (SACF). You find all DUN Active whitelist &A changed ( &B )
messages in section “Other
DUQ Active scenario &A for switchable authorization checks changed - &B
Events”
© 2022
2016-10 SAP SE. All rights reserved. 1315
Activate logging via Security Audit Log
for Switchable Allowlists (SLDW) and Authorization Checks (SACF)
Use report RSAU_SELECT_EVENT
to show the log.
The following SAP Notes provides solution which do not require a switch:
October 2016:
2257328 CRM-BF Missing authorization checks in CRM Portal Content function modules
2271018 CRM-BF-CFG Missing authorization checks in function modules related to CRM knowledgebases for configurable products
2246269 CRM-BTX Missing authorization check in CRM-BTX
2271740 CRM-BTX-LEA Missing authorization check in CRM-BTX-LEA
2263132 CRM-CHM Missing authorization check in CRM-CHM
2276488 CRM-IC-HCM-BF Missing authorization check in CRM-IC-HCM
2241871 WEC-APP-SRV Missing authorization check in WEC-APP
© 2022
2016-10 SAP SE. All rights reserved. 1317
Note 2078596 - Further improvements for RFC security (reloaded)
Comments about unconditional authorization checks
Note 2257328 – CRM-BF Missing authorization checks in CRM Portal Content function modules
MESSAGE TYPE 'E' without RAISING in a function, therefore I expect trouble (runtime error) if a user does not
have required authorizations.
Note 2263132 – CRM-CHM Missing authorization check in CRM-CHM
Missing authorization checks were implemented using Access Control Engine (ACE). The RFC user might need
such authorizations.
Note 2276488 CRM-IC-HCM-BF Missing authorization check in CRM-IC-HCM
Authorization for CRM_ORD_OP with PARTN_FCT = '*' and PARTN_FCTT = '*' for activity 03=display required.
See also:
Note 2251513 – Missing Authorization Check in XX-PROJ-FI-CA
Exceptions of CALL FUNCTION 'AUTHORITY_CHECK_TCODE' are not catched, therefore I expect trouble
(runtime error) if a user does not have required authorizations.
© 2022
2016-10 SAP SE. All rights reserved. 1318
Note 2029397 - Missing authorization checks for RFC in E-
commerce ERP applications (reloaded)
Which changes had happened between current version 7 (October 2016) and previous
published version 5 (October 2015)?
But: You need the described authorizations if you are using the application.
© 2022
2016-10 SAP SE. All rights reserved. 1319
Note 2029397 - Missing authorization checks for RFC in E-
commerce ERP applications (reloaded)
© 2022
2016-10 SAP SE. All rights reserved. 1320
Note 1694657 - GRC SPM RFC Destination Call and FFID Passwords
The note describes additional settings to secure the usage of FireFighters of GRC AC (5.3).
• However, most parts are valid for GRC 10.x as well.
R/3 System A
• The software updates described in this note are old Dialog User having authorizations
for specific transactions and RFC
connections
and most likely are not required anymore. Trust
relationship
Application program
CALL FUNCTION … R/3 System B
• Main idea (see note 128447): DESTINATION …
• Side comment:
Table RFCDES Parameters + with RFC user Application program
authentication
information RFC User having authorizations for
Take special care about authorizations for (RFC user but
no password)
RFC function groups, calling RFC
clients and the called application .
S_ADMI_FCD with value NADM,
S_RFC_ADM (maintain RFC Destinations), Source: Presentation RFC Security v1.1 from 2004
and S_RFC_TT (maintain trust relationship) respective Teched 2012 session SIS264 Securing RFC
© 2022
2016-10 SAP SE. All rights reserved. 1321
Note 1694657 - GRC SPM RFC Destination Call and FFID Passwords
© 2022
2016-10 SAP SE. All rights reserved. 1322
Note 1694657 - GRC SPM RFC Destination Call and FFID Passwords
© 2022
2016-10 SAP SE. All rights reserved. 1323
Note 1694657 - GRC SPM RFC Destination Call and FFID Passwords
© 2022
2016-10 SAP SE. All rights reserved. 1324
Note 1694657 - GRC SPM RFC Destination Call and FFID Passwords
RFC_INFO * (or local installation number) * (or local installation * (or installation number
number) of GRC box)
ACTVT 16 16 16
© 2022
2016-10 SAP SE. All rights reserved. 1325
Note 1694657 - GRC SPM RFC Destination Call and FFID Passwords
© 2022
2016-10 SAP SE. All rights reserved. 1327
System Landscape – SolMan and Central FireFighter
FireFighter:
Identical authorizations for S_RFCACL
in all clients in all systems:
SAP Solution Manager ERP
RFC_SYSTEM = SOL (SolMan system)
and GRC Box RFC_CLIENT = 010 (GRC client)
Admin RFC_EQUSER =N
Admin Client 000 RFC_USER =*
Client 000 Trusted RFC_TCODE = GRAC_EAM
systems
ERP
Client 100
GRC Trust SolMan
Client 010 Trust GRC
SolMan Admin Users:
Identical authorizations for S_RFCACL
in all clients in all systems:
© 2022
2016-10 SAP SE. All rights reserved. 1328
System Landscape – SolMan and decentral FireFighter
FireFighter:
GRC Box Different authorizations for S_RFCACL
in all clients in all systems:
GRC Trust
GRC ERP
Client 010 RFC_SYSTEM = <current system>
RFC_CLIENT = <current client>
Admin
RFC_EQUSER =N
Client 000 RFC_USER =*
Trust RFC_TCODE = /GRCPI/GRIA_EAM
SolMan Trusted systems
Trust
ERP GRC
SAP Solution Manager
Client 100
Admin
Client 000 SolMan Admin Users:
Identical authorizations for S_RFCACL
in all clients in all systems:
Report RS_SECURITY_TRUST_RELATIONS
For each trust relationship, the report specifies the security procedure used, either security procedure 1
(not recommended) with a red light or security procedure 2 (recommended) with a green light. The
procedure-1 relationships to trusted systems (left list) can be deleted by double-clicking the delete icon in
the "Delete" column. Procedure-1 relationships to systems that trust the current system, on the other
hand, can be updated by running the report RS_UPDATE_TRUST_RELATIONS.
© 2022
2016-10 SAP SE. All rights reserved. 1330
August 2016
no Webinar
September 2016
live from TechEd Las Vegas (Frank Buchholz):
Wednesday, September 21, 2016 02:00 PM-04:00 PM
respective on DSAG Jahreskongress Donnerstag, 22.9.2016
(Birger Toedtmann)
Topics September 2016
© 2022
2016-09 SAP SE. All rights reserved. 1332
Onapsis Issues 15 Advisories Affecting SAP HANA and SAP Trex
http://www.onapsis.com/onapsis-issues-15-advisories-affecting-sap-hana-and-sap-trex
In SAP HANA SPS 11 and above all coding correction corresponding to these advisories are already
included.
You can check these parameters using application Configuration Validation in the SAP Solution Manager,
too. The parameters are stored in the configuration store HDB_PARAMETERS.
(*) Keep in mind that user SYSTEM should be deactivated in production systems anyway
© 2022
2016-09 SAP SE. All rights reserved. 1333
Onapsis Issues 15 Advisories Affecting SAP HANA and SAP Trex
http://www.onapsis.com/onapsis-issues-15-advisories-affecting-sap-hana-and-sap-trex
Use the following sql statement in the HANA studio to check all three parameters:
© 2022
2016-09 SAP SE. All rights reserved. 1334
Onapsis Issues 15 Advisories Affecting SAP HANA and SAP Trex
http://www.onapsis.com/onapsis-issues-15-advisories-affecting-sap-hana-and-sap-trex
More details as well as coverage for lower SPS can be found in following notes:
2176128 - Potential information disclosure relating to server information (solution with revision 95)
2148905 - Potential information disclosure relating to passwords in SAP Web Dispatcher trace files (solution with
rev. 97)
2197459 - Potential log injection vulnerability in SAP HANA audit log (solution with rev. 85.05, rev. 97.02, rev. 102)
2216869 - Security improvement of HANA authentication (solution with rev. 97.03, rev. 102)
2233136 - Potential termination of running processes triggered by IMPORT statement (solution with rev. 102.02,
rev. 110)
2252941 - Potential information disclosure relating to files exported from SAP HANA with EXPORT statement
(solution with rev. 102.03, rev. 110)
2233550 - Communication encryption for HANA multi tenant database containers does not work as expected
(solution with rev. 102.02, rev. 110)
© 2022
2016-09 SAP SE. All rights reserved. 1335
Note 1477597 - Unauthorized modification of stored content in NW
KMC
Update note 2351001 points out that there is a new manual activity in this old note for all Java
Systems having NW KMC for all releases and SP:
Navigate to "System Administration → System Configuration → Knowledge Management → Content
Management → Protocols → (Show Advanced Options) → WebDAV" in the portal, open "WebDAV
Protocol" configuration for edit and activate parameter "Force Text Download".
When parameter "Force Text Download" is activated, the system does not allow you to open files
containing executable scripts with your Web browser, thus preventing the execution of potentially
malicious scripts. Instead, when trying to open the file with a Web browser, you are prompted to
choose between “Open”, “Download” or “Cancel”.
Alternate solution:
If a malicious script filter is activated for the repository containing the file with executable script, this
parameter “Force Text Download” is ignored. For more information, see
© 2022
2016-09 SAP SE. All rights reserved. 1337
Old Update Notes
Old Update Notes my miss validity information about the relevant software component
versions. System Recommendations shows such notes for all systems.
Some of these notes are corrected now using the text similar to this: “This note has been re-released
after adding the required validity. The update contains no new corrections.”
Examples:
Limitation: The validity information for SP ranges is not added (only for software component
and release).
© 2022
2016-09 SAP SE. All rights reserved. 1338
Note 2227969 - SAP_NEW profile exists despite SAP Note 1711620
Note 1711620 - Role SAP_NEW replaces profile SAP_NEW
The composite profile SAP_NEW is obsolete (no longer required with the use of transactions PFCG and
SU25) and should no longer be used.
However, if you still require the SAP_NEW algorithm, use the program REGENERATE_SAP_NEW and
create a corresponding role SAP_NEW.
© 2022
2016-09 SAP SE. All rights reserved. 1339
Reloaded: How to define cipher suites for SSL/TLS in ABAP, Java,
and HANA
Note 2110020 is a how-to guide about the configuration of desired cipher suites.
ABAP (ICM, Web Dispatcher, MSG Server, SAP_HTTP) and Java incoming connections (ICM)
• You can configure the desired cipher suites through the two profile parameters ssl/ciphersuites
and ssl/client_ciphersuites according to the description and recommended settings in
Section 7 of note 510007 respective in note 2253695.
• Example to use TLS 1.2 only: ssl/ciphersuite = 544:HIGH
Java outgoing connections
• You can configure the desired cipher suites through the two configuration properties
client.minProtocolVersion and client.maxProtocolVersion according to the description
and recommended settings in note 2284059.
HANA
• Note 2312071 describes how to define the profile parameter ssl/ciphersuites for the web
dispatcher of HANA
© 2022
2016-09 SAP SE. All rights reserved. 1340
July 2016
Topics July 2016
© 2022
2016-07 SAP SE. All rights reserved. 1342
News about the SAP ONE Support Launchpad
Since April 2016, the new SAP ONE Support Launchpad is the default for users accessing SAP
support applications online. The links to legacy applications will remain in place until August
15th, 2016 to accommodate any major feature gaps or access issues that may arise in the
meantime.
The SAP Support Portal (support.sap.com) will continue to be the main entry point for all
customers but will now seamlessly direct the customer into their new Launchpad and
redesigned applications. Traditional support applications that do not yet have a replacement,
will continue to be accessible in the SAP Support Portal.
More information can be found on SAP ONE Support Launchpad Application Overviews.
Report issues with Launchpad and new applications using the Feedback button
or create an incident:
https://support.sap.com/contactus
→ Report an incident for component XX-SER-SAPSMP-LAUNCH
© 2022
2016-07 SAP SE. All rights reserved. 1343
News about System Recommendations in SolMan 7.1
SAP’s Standards, Processes, and Guidelines for Protecting Data and Information
https://support.sap.com/dam/library/SAP%20Support%20Portal/kb-incidents/notes-knowledge-base-
notification/security-notes/white-papers/ags-sec-mgmt_en.pdf
Table of Contents
• Security as a Top Priority at SAP
• General Security at SAP
• Security Management at SAP
• Security in the SAP Digital Business Services Organization
• Appendix - Relevant Security Certifications / Important Links / FAQ
© 2022
2016-07 SAP SE. All rights reserved. 1345
Note 2220030 - STUSERTRACE: User trace for authorization checks
© 2022
2016-07 SAP SE. All rights reserved. 1346
Tips for the Upgrade of a system with a CUA central system
If CUA main system is still running on SolMan 7.1 you should consider an upgrade to SolMan 7.2 to get the latest
updates for the CUA. (The same is true for any other system with SAP_BASIS 7.02 or older.)
https://wiki.scn.sap.com/wiki/display/Security/Upgrade+of+a+system+where+a+CUA+central+system+resides
Summary:
An upgrade of the CUA main system to SAP_BASIS 7.40 or higher is valuable to get
➢ better performance (delta data distribution instead of full data distribution)
➢ better user interface in SU01
➢ new option to add documentation to users
Do not forget to open the CUA landscape in transaction SCUA and simply save it to activate some of
these new features.
© 2022
2016-07 SAP SE. All rights reserved. 1347
Note 2288530 - System internal logons are not properly logged in
Security Audit Log
© 2022
2016-07 SAP SE. All rights reserved. 1348
Note 2223635 - Fixes in CommonCryptoLib 8.4.43
© 2022
2016-07 SAP SE. All rights reserved. 1349
Note 2223635 - Fixes in CommonCryptoLib 8.4.43
Tipp from an ASUG Member: Use transaction SHD0 to create the „Standard Transaction Variant“
(respective use GUIXT) which forces STRUST to use a different default.
© 2022
2016-07 SAP SE. All rights reserved. 1350
Note 991968 - List of values for "login/password_hash_algorithm"
For password hashing you can keep on using SHA-1 but you may want to make it harder for an
attacker to perform brute-force or dictionary attacks by increasing the count of iterations.
Profile parameter login/password_hash_algorithm denotes which password hash algorithm is
used for new / changed passwords.
Note 991968 - List of values for "login/password_hash_algorithm"
Note 2076925 - Additional SHA password hash algorithms supported
Note 2140269 - ABAP password hash: supporting salt sizes up to 256 bits
Online Help
Value ranges:
Encoding: RFC2307
Algorithm: iSSHA-1 | iSSHA-256 | iSSHA-384 | iSSHA-512 default = iSSHA-1 is ok
Iterations: 1 – 4294967294 (232) default = 1024 → 10000
Saltsize: 32 – 256 (divisible by 8) default = 96 is ok
© 2022
2016-07 SAP SE. All rights reserved. 1351
Clickjacking
Overview
https://www.owasp.org/index.php/Clickjacking
© 2022
2016-07 SAP SE. All rights reserved. 1354
Clickjacking
Example (variant with attacker on top)
Fake input controls on
attacker frame are
positioned above the
hijacked controls of the
webpage.
Attacked website is
visible but inactive
concerning input.
© 2022
2016-07 SAP SE. All rights reserved. 1355
Clickjacking
new notes (compared with first publication in July 2016; marked red on next slide)
Note 1888001 - Error “This content cannot be displayed in a frame” is shown on CRM WebUI page
Note 2299560 - Issue with the SHL report creation
Note 2350711 - Targetgroup List of Hybris Marketing can't be displayed inside CRM
Note 2080913 - Error "This content cannot be displayed in a frame" on SRM-MDM in Internet Explorer
Note 2242128 - Clickjacking protection works only with limitations
Note 2354565 - ClickJacking notes for Fiori and downloading UI NW Add-On
Note 2327506 - Shared Service Framework: Enabling SAP Fiori Transaction Launch
More notes (not checked yet)
Note 2339506 - Whitelist based Clickjacking Framing Protection in Utility Customer E-Services
[…]
© 2022
2016-07 SAP SE. All rights reserved. 1356
Clickjacking
Relationship between notes
Framework
2215694 BSP
Overview SRM
2319192
+ table 2319727 2080913 ABAP
2119535 BSPGLOBAL WDJ
SETTING
2169860 Java
NWBC JSP
2148130 2290783
2319174 CRM
SAPUI5 2299560
1888001
SAPUI5 2245332 BW Portal
2090746
2319184 Fiori 2209907 2169722
2097342 WDJ
+ config for 2333957 2350711
… frameOptions
2286679
WDA
2299529 2075016 2057847 2276701
1872800 HTMLB
2233155 2263656
2316247 UI NW SBOP
2249111
2317190 Add-On 2198329
1893306
2318319 2354565 FSCM
2324896 2248688 2327506 2339167
© 2022
2016-07 SAP SE. All rights reserved. 1357
Clickjacking
ABAP
Note 2142551 - Whitelist service for Clickjacking Framing Protection in AS ABAP
Note 1872800 - Whitelist based Clickjacking Framing Protection in Web Dynpro ABAP
Note 2245332 - Automatic usage of Whitelist Service for Clickjacking Framing Protection in SAPUI5 Apps
Note 2319172 - Whitelist based Clickjacking Framing Protection in SAP GUI for HTML
Note 2319174 → 2148130 - Whitelist based Clickjacking Framing Protection in NWBC for HTML
Note 2319192 - Whitelist based Clickjacking Framing Protection in BSP
and Note 2090746 - Unified Rendering Notes - Which One To Apply - Instructions And Related Notes
Note 2242128 - Clickjacking protection works only with limitations
Note 2354565 - ClickJacking notes for Fiori and downloading UI NW Add-On
Note 2350711 - Targetgroup List of Hybris Marketing can't be displayed inside CRM
mandatory settings
© 2022
2016-07 SAP SE. All rights reserved. 1358
Clickjacking
General switch / allowlist
Table HTTP_WHITELIST field ENTRY_TYPE (maintenance using SE16 only)
01 HTTP Framework to filter for valid URLs (Note 853878)
02 Exit URL for parameter sap-exiturl
03 NWBC runtime
10 WebDynpro Resume URL (Note 2081029)
11 Web Dynpro Redirect URL (Note 2081029)
20 Redirect URL for parameter sap-mysapred of ICF (Note 612670)
21 Redirect URL for parameter redirectURL of ICF (Note 1509851)
30 Clickjacking protection (Note 2142551)
40 Suite Redirect
99 Generic
You can use report RS_HTTP_WHITELIST instead, too, which shows the value help for the entry type
field.
© 2022
2016-07 SAP SE. All rights reserved. 1359
Clickjacking
Recommended SP for ABAP
Required SP for ABAP (mainly according to notes 2142551 and 2319184)
„Implementing UR SAP Notes via SNOTE may be a time consuming process.”
© 2022
2016-07 SAP SE. All rights reserved. 1361
Clickjacking
Additional Information for ABAP
Note 1872800 requires Unified Rendering note 2090746 which might require many other notes.
Notes 2319192 and 2327506 requires additional activation in table BSPGLOBALSETTING with an
entry showing CLICKJACKING = ON
Note 2327506 asks for a generic * entry in table HTTP_WHITELIST with ENTRY_TYPE = 30 which
(as I assume) would mage Clickjacking Protection worthless. Do not create such entry.
© 2022
2016-07 SAP SE. All rights reserved. 1362
Clickjacking
Result for WebDynpro ABAP
When launching an external website(For example: www.google.com) in CRM Widget, Web Links or
URL based transaction launcher, you may not be able to display the content due to following error:
© 2022
2016-07 SAP SE. All rights reserved. 1364
ClickJacking Notes
Additional information for Java
© 2022
2016-07 SAP SE. All rights reserved. 1366
ClickJacking Notes
Additional information for Java
Note 2290783 - Whitelist based Clickjacking Framing Protection for Java Server Pages
• Adopt the impacted custom application based on JSP
© 2022
2016-07 SAP SE. All rights reserved. 1367
ClickJacking Notes
Additional information for Java
Question: What about notes which do not match to my release or SP – are they relevant?
Example: Do I need note 2263656 for a system which runs with LIFECYCLE MGMT TOOLS 7.01
SP 17 (to take one of the components as an example)?
Answer: Yes, older SP are usually also affected by security vulnerabilities (and older Releases
often, too)!
The note offers patches for following releases and SP: Release SP Patch
LIFECYCLE MGMT TOOLS 7.00 SP033 000002
On 7.01 there is a patch for SP 18 available and SP 19 LIFECYCLE MGMT TOOLS 7.00 SP034 000000
contains the solution. SP 17 is affected as well – LIFECYCLE MGMT TOOLS 7.01 SP018 000002
especially in case of a general issue like Clickjacking, LIFECYCLE MGMT TOOLS 7.01 SP019 000000
however, you have to run an SP upgrade to get the LIFECYCLE MGMT TOOLS 7.02 SP018 000003
solution. LIFECYCLE MGMT TOOLS 7.02 SP019 000000
On the other hand, newer releases could be safe automatically – but only if only software updates give
you the complete solution. A manual configuration step most likely is relevant for newer releases as well!
© 2022
2016-07 SAP SE. All rights reserved. 1368
June 2016
Topics June 2016
© 2022
2016-06 SAP SE. All rights reserved. 1370
Security Notes on the Support Portal
https://support.sap.com/securitynotes
© 2022
2016-06 SAP SE. All rights reserved. 1371
Security Notes in the Launchpad “General Search”
(not related to current app)
Download list
Filter
© 2022
2016-06 SAP SE. All rights reserved. 1372
SAP HANA Security
Maintenance Strategy, Revision Management and Patching
Holger Mack, SAP SE
June 2016
© 2022
2016-06 SAP SE. All rights reserved. 1373
HANA Patching – Customer Questions & Pain-Points
© 2022
2016-06 SAP SE. All rights reserved. 1374
Maintain security of your SAP HANA systems and stay up-to-date
© 2022
2016-06 SAP SE. All rights reserved. 1375
Security patches
© 2022
2016-06 SAP SE. All rights reserved. 1376
SAP HANA Maintenance Strategy
Overview Timeline
• New capabilities are introduced twice a year, every time a new SAP HANA Support Package Stack (SPS) is
released. This happens normally in December and June
• Datacenter Service Point is declared about 3 month after RTC, normally in March and September
• SAP is not providing maintenance revisions for previous SPS anymore once the DSP of the next SPS is
declared
• Critical bug fixes and security patches are provided as SAP HANA revisions for all HANA SPS that are still in
maintenance
• We recommend that maintenance timelines and project go live dates
SPS nnare
+1 adjusted
SPSto
nn this
+ release schedule
RTC DSP
SPS nn SPS nn
RTC DSP
SPS nn -1 SPS nn -1
RTC DSP
© 2022
2016-06 SAP SE. All rights reserved. 1378
SAP HANA Maintenance Strategy
Revision Strategy for SPS12
Customers running mission critical systems demand a longer provisioning of Maintenance Revisions
For SAP HANA SPS12:
• SAP will provide Maintenance Revisions for a period of 3 years after SPS12 RTC
• There will be regular upgrade paths from SPS12 to any newer SPS
SPS 12 SPS 12 SPS 12 Maintenance Revisions
RTC DSP SPS 12
… EoM
May
2019
SPS 11 SPS 11
RTC DSP
SPS 11
EoM
© 2022
2016-06 SAP SE. All rights reserved. 1380
HANA Security Note Example (2/2)
© 2022
2016-06 SAP SE. All rights reserved. 1381
Applications built on SAP HANA XS advanced model (SPS11)
Client
De-coupling will also supportPresentation
separate
Logic
patching of database, application server and
development-environment and tools
HTTP(S)
UAA
node.js
Development Java
Tools XSJS
Calculation
Logic
Container
SAP HANA
© 2022
2016-06 SAP SE. All rights reserved. 1382
What is preventing you from upgrading your systems?
SAP HANA offers features that support you in making revision upgrades as painless as
possible
© 2022
2016-06 SAP SE. All rights reserved. 1384
How to use SAP HANA Mini Check for Security Validation
SAP HANA Security Checklists and Recommendations For SAP HANA Database
http://help.sap.com/hana/SAP_HANA_Security_Checklists_and_Recommendations_en.pdf
© 2022
2016-06 SAP SE. All rights reserved. 1385
Note 2252312 - Insufficient logging of RFC in SAL
This note has several other notes as prerequisites (2176138, 2128095, 2124538, 2025307,
1970644, 1968729, …)
Most likely you will run into trouble if note 2025307 is required. This note is related to note
1970644 and vice versa and it‘s quite difficult to implement both together.
© 2022
2016-06 SAP SE. All rights reserved. 1386
Note 2306709 - Code Injection vulnerability in Documentation and
Translation Tools
© 2022
2016-06 SAP SE. All rights reserved. 1387
Note 2160790 - Missing authorization check in FS-CML
However, take care with this note as the correction is untypical: some calls do not show error
messages in case of missing authorizations.
© 2022
2016-06 SAP SE. All rights reserved. 1388
Note 2195409 - Potential modif./disclosure of persisted data in SAP
CPQ Solution Configuration (SME)
© 2022
2016-06 SAP SE. All rights reserved. 1389
Note 1882254 - Authorization check for logon data not based on
passwords
The customizing tables PRGN_CUST, SSM_CUST, and USR_CUST contain several security related
customizing switches. Use table SSM_CID to show the complete value help for all customizing
switches. Have a close look to switches which show a note number in the short text.
© 2022
2016-06 SAP SE. All rights reserved. 1390
Note 1882254 - Authorization check for logon data not based on
passwords
Samples for PRGN_CUST
ASSIGN_ROLE_AUTH ASSIGN (Default), CHANGE: Checks When Assigning Users to Functions (Note 312682)
CHECK_S_USER_SAS YES (Default), NO - Activation of Authorization Object S_USER_SAS (Note 536101)
GEN_PSW_MAX_DIGITS Values between login/min_password_digits and 40 (default) - max. number of digits in
generic password (Note 662466)
GEN_PSW_MAX_LENGTH Values between login/min_password_lng - 40 (default)- max. password length of
generated password (Note 915488)
GEN_PSW_MAX_LETTERS Values between login/min_password_letters and 40 (default) - max. number of letters in
generated password (Note 662466)
GEN_PSW_MAX_SPECIALS Values between login/min_password_specials and 40 (default) - max.number of special
characters in generated password (Note 662466)
REF_USER_CHECK W (Default), E, S, I (Ignore) - Message Type When Assigning Reference Users with Other User
Type (Note 513694 )
Samples for USR_CUST
CHECK_NONPW_LGNDATA <SPACE> (default), 'X' - Check for activity 36 during change of non-password-based logon data
(Note 1882254)
USER_GRP_REQUIRED Default user group; due to this, the user group becomes a required entry field (Note 1663177)
© 2022
2016-06 SAP SE. All rights reserved. 1391
May 2016
Topics May 2016
© 2022
2016-05 SAP SE. All rights reserved. 1393
News about invoker servlet
Alert (TA16-132A)
Alert (TA16-132A)
Exploitation of SAP Business Applications
https://www.us-cert.gov/ncas/alerts/TA16-132A
After disabling the invoker servlet you may get the following 403 response code:
Error: Servlet with class <class name> cannot be loaded.
SAP had updated several applications to use individual servlets instead and does not use it anymore
for productive applications:
Note 1460635 - RWB link "Index Administration" shows error 403 - forbidden
Note 1463661 - Open SQL monitors: Servlets cannot be loaded
Note 1467771 - Disabling invoker servlet in the portal
Note 1488846 - CRM ECO. Security - Invoker Servlet
Note 1535301 - Invoker Servlet Fix for IS-M/AMC
Note 1537663 - Biller Direct, Security - Invoker Servlet
Note 1589525 - Verb Tampering issues in CTC
Note 1598246 - Servlet declaration missing for LWC SOAP Dispatcher servlet
Note 1802092 - PDF display error due to invoker servlet disabled in NW 7.3
Note 1900752 - VSCANTEST Application returns 403 response code
© 2022
2016-05 SAP SE. All rights reserved. 1395
News about invoker servlet
Remote Java SOS
The parameter is checked by the Remote SOS Java (no Self-Service; not in EWA):
Invoker Servlet (JE165)
Procedure:
1. NWA: → Configuration → Infrastructure → Java System properties.
2. Select the "Services" tab.
3. Search for the Web Container (servlet_jsp).
4. Find the parameter EnableInvokerServletGlobally. You may want to
Evaluated Risk - High validate this file, too.
Description: The invoker servlet is intended only to be used for rapid prototyping and allows
HTTP clients to invoke servlets that have not been declared in the application’s /WEB-INF/web.xml file.
A specially crafted URL using the invoker servlet feature can allow unauthenticated access to arbitrary
servlets. In addition, there is no authentication needed in order to invoke these servlets.
Recommendation: The invoker servlet feature should be disabled to close the security gap described
above.
© 2022
2016-05 SAP SE. All rights reserved. 1396
News about invoker servlet
SAP Solution Manager - Configuration Store
How to find elements in a Configuration
Store:
© 2022
2016-05 SAP SE. All rights reserved. 1398
Introduction to CVSS v3
As of March 01, 2016, SAP Security Note prioritization is based on CVSS v3 Base score. The revised
prioritization scheme is aligned with the industry’s best practice, and to provide better transparency to
our customers.
From March 2016 security patch day, all patch day security notes will carry CVSS v3 Base score and
vector information to assist our customers in their risk assessment.
Security Note
CVSS v3 Base score
For further details, please refer to our blog on CVSS v3.
Priority
Low 0.1 - 3.9
Medium 4.0 - 6.9
High 7.0 - 8.9
Hot News 9.0 - 10.0
© 2022
2016-05 SAP SE. All rights reserved. 1399
Introduction to CVSS v3 & how it is used in SAP
Renchie Joan Abraham, SAP Product Security Response
Member of CVSS Special Interest Group
May 2016
© 2022
2016-05 SAP SE. All rights reserved. 1400
Base metric scoring changes in CVSS v3 (compared to CVSS v2)
Access Complexity (AC): High, Medium, Low Attack Complexity (AC): NEW High, Low
Privileges required (PR): NEW High, Low, None
Authentication (Au): Multiple, Single, None User Interaction (UI): NEW None, Required
Confidentiality Impact (C): None, Partial, Complete Scope (S): NEW Unchanged, Changed
Confidentiality (C): None, Low, High NEW
Integrity Impact (I): None, Partial, Complete
Integrity (I): None, Low, High NEW
Availability Impact (A): None, Partial, Complete
Availability (A): None, Low, High NEW
© 2022
2016-05 SAP SE. All rights reserved. 1401
Key conceptual changes in CVSS v3: Introduction of Scope metric
© 2022
2016-05 SAP SE. All rights reserved. 1402
How CVSS v3 is used in SAP ?
The security note priority is now calculated entirely based on CVSS v3 Base metric score.
CVSS has 2 additional sets of metric groups, which can be derived by SAP
customers using tools by FIRST or NVD:
© 2022
2016-05 SAP SE. All rights reserved. 1403
Publications by PSRT:
Example:
Choose the
language
© 2022
2016-05 SAP SE. All rights reserved. 1407
“Notes Search” in the Support Portal
https://support.sap.com/notes
Example to identify notes related to a Directory Traversal
project by searching for:
FILE_VALIDATE_NAME FILE_GET_NAME 1497003
© 2022
2016-05 SAP SE. All rights reserved. 1408
Note 2264239 - Failed Trusted System logon is reported as
successful logon in the audit log
Issue: Last logon date (table USR02 / report RSUSR200) is updated in case of an unsuccessful
Trusted-RFC connection because of missing authorizations for S_RFCACL
Related note:
Note 320991 - Error codes during logon (list)
© 2022
2016-05 SAP SE. All rights reserved. 1409
How to analyze old Support Package Notes which become visible now
© 2022
2016-05 SAP SE. All rights reserved. 1410
RFC Gateway Settings
Note 1444282 - gw/reg_no_conn_info settings
© 2022
2016-05 SAP SE. All rights reserved. 1411
Note 1933375 - RU ERP for Banking. Missing authorization check.
Potential modification of persisted data
The note solves a vulnerability issue about CALL TRANSACTION (plus some more) but
introduces a new error which was solved with normal note 1946751. Do not forget to to
implement this 2nd note if you apply the 1st note.
All theses notes are old notes, which are completely part of a Support Package.
© 2022
2016-05 SAP SE. All rights reserved. 1412
Note 2201916 - Missing authorization check in XX-CSC-IN-FI
The note solves a vulnerability issue about CALL TRANSACTION but introduces a new error
which was solved now with normal note 2304353. Do not forget to to implement this 2nd note if
you apply the 1st note.
© 2022
2016-05 SAP SE. All rights reserved. 1413
Note 2051717 - [MUNICH] Review of Testcase 100 / Report
RSORAVCR of component BC-CCM-MON-ORA
This seems to be an Oracle specific note. Do you need it if you use another database?
Using this report you execute following fixed database statements for the local or a remote
database via ADBC calls:
analyze index <owner>."<segname>" validate structure
alter index <owner>."<segname>" coalesce
alter index <owner>."<segname>" rebuild online
The security vulnerability allows to modify these statements. Can you prove that your other
database is not affected if such statements are executed?
Tipp: Secure SA38, SE38 etc. as this report does not contain any authorization check.
© 2022
2016-05 SAP SE. All rights reserved. 1414
Note 2195409 - Potential modif./disclosure of persisted data in SAP
CPQ Solution Configuration (SME)
Strange correction:
• Forms are called UPDATE_TABLE and similar but the authorization check is about activity
03=display
→ If you implement this note then adjust roles for modelers that export configuration
knowledge bases from the solution modeling environment into ECC
Or wait – maybe there will be an update … or create a ticket to ask for advice
© 2022
2016-05 SAP SE. All rights reserved. 1415
April 2016
Topics April 2016
Note 2293011 - Upgrade Information: Default Users within SAP Solution Manager
Note 2285879 - SAL | Filter selection by user group as of NetWeaver 7.40
Note 2090487 - SAL | Enable recording of user groups (kernel part)
Note 2191612 - FAQ | Use of Security Audit Log as of NetWeaver 7.50
Note 2201295 - Unauthorized modification of displayed content in UR Control
Note 2284952 - Update 2 to Security Note 1971238
Note 2221657 - Code injection vulnerability in SAP Internet Communication Manager
How to identify HANA Security Notes
Note 2277492 - Configuration Validation: How-to transport Target Systems
Note 2177996 - Transaction PFCGMASSVAL Mass maintenance of authorization values in roles
Release 7.31 & 7.40: Improvement for ABAP Role Management
© 2022
2016-04 SAP SE. All rights reserved. 1417
Note 2293011 - Upgrade Information: Default Users within SAP
Solution Manager
About SAP Solution Manager 7.1 and 7.2 (if system was upgraded from older release)
The default passwords of the users being created by the former Diagnostics Configuration wizard (7.0)
or transaction SOLMAN_SETUP (with 7.0 EHP1) are commonly known and might not have been
changed in your system.
On the Solution Manager system
SOLMAN_BTC (type system user)
CONTENTSERV (type system user)
SMD_RFC (type system user)
SMD_ADMIN (type system user)
Delete this user if you run SolMan 7.1 SP10 or higher. For lower version see note 2119627.
On the Managed systems (including the Solution Manager system itself)
SMDAGENT_<SAPSolutionManagerSID> (type system user)
SAPSUPPORT (type dialog)
© 2022
2016-04 SAP SE. All rights reserved. 1418
Note 2293011 - Upgrade Information: Default Users within SAP
Solution Manager
ERP-SEC released a
free tooling to check
your SAP platform for
default Solution
Manager user
passwords
March 9, 2016
https://protect4s.com/erp-
sec-releases-free-tooling-
check-sap-platform-
default-solution-manager-
users/
(The program works only if default of profile parameter login/password_hash_algorithm was used while creating the users.)
© 2022
2016-04 SAP SE. All rights reserved. 1419
Note 2285879 - SAL | Filter selection by user group, NetWeaver 7.40
Note 2090487 - SAL | Enable recording of usergroups (kernel part)
Prerequisites:
Note 2285879 - SAL | Filter selection by user group
SAP_BASIS 7.40 SP 15 (no implementation via SNOTE)
SAP_BASIS 7.50 SP 04
Note 2090487 - SAL | Enable recording of user groups (kernel)
Kernel 7.41 patch 210
Kernel 7.42 patch 29
Kernel 7.43 patch 4
Comments:
– Patterns for users are possible ( FF* , SAP#* )
– Patterns for user groups are not possible
– You can include or exclude a user group
– You can define up to 15 filters
– Kernel parameters replace the profile parameters
© 2022
2016-04 SAP SE. All rights reserved. 1420
Note 2191612 - FAQ | Use of Security Audit Log as of NetWeaver 7.50
© 2022
2016-04 SAP SE. All rights reserved. 1421
SAL: Configuration (Transaction RSAU_CONFIG)
© 2022
2016-04 SAP SE. All rights reserved. 1422
Note 2201295 - Unauthorized modification of displayed content in
UR Control
This corrections contain parts for Web Dynpro ABAP, Web Dynpro JAVA and the Kernel and settings.
a) Web Dynpro ABAP
7.50: note 2207387, 7.40: note 2154957, 7.31: note 2156710, 7.30: note 2454726
7.11: note 2159126, 7.02: note 2097342, 7.01: note 2154821,
Each note points to several other notes containing ABAP parts and recommends a manual task.
b) Web Dynpro JAVA
This note 2201295 shows required Java patches
c) SAP GUI for HTML / Kernel
SAP kernel 745/742/722: note 2203088
SAP kernel 721: note 2214695
Conclusion:
➢ get latest ABAP SP of SAP_UI, Java patches, and Kernel and consider to adjust memory settings
as described by note 2180736.
© 2022
2016-04 SAP SE. All rights reserved. 1423
Note 2284952 - Update 2 to Security Note 1971238
It’s a side-effect note: This note does not solve an additional security vulnerability but
corrects an error introduced with previous note.
Note 1971238 March 2014 → Note 2017050 March 2016 → Note 2284952 April 2016
© 2022
2016-04 SAP SE. All rights reserved. 1424
Note 2221657 - Code injection vulnerability in SAP Internet
Communication Manager (and WebDispatcher)
© 2022
2016-04 SAP SE. All rights reserved. 1425
Note 2221657 - Code injection vulnerability in SAP Internet
Communication Manager (and WebDispatcher)
Now let’s check another release of the WebDispatcher:
https://support.sap.com/patches → Search for Software → SAP WEB DISPATCHER
→ e.g. SAP WEB DISPATCHER 7.21 → choose any OS → show Info file
Result:
both notes 2221657 and 2256185
are part of the patch for 7.21, too
© 2022
2016-04 SAP SE. All rights reserved. 1426
How to identify HANA Security Notes
© 2022
2016-04 SAP SE. All rights reserved. 1427
Note 2277492 - Configuration Validation: How-to transport Target Systems
You want to transport custom defined Target Systems of the application Configuration Validation in the
SAP Solution Manager.
The required transport keys are described in the wiki: ConfigVal: Transport Target Systems
Use this new report DIAGCV_TRANSPORT_TARGET_SYSTEM to add custom defined Target Systems to
a transport order.
Do you know the Security Baseline Template Version 1.8 at the media library of
https://support.sap.com/sos ?
The new version 2 of the corresponding ConfigVal Package offers transport files to import the template
target systems easily.
© 2022
2016-04 SAP SE. All rights reserved. 1428
Note 2177996 – Transaction PFCGMASSVAL
Mass maintenance of authorization values in roles
Example:
© 2022
2016-04 SAP SE. All rights reserved. 1429
Note 2177996 – Transaction PFCGMASSVAL
Mass maintenance of authorization values in roles
© 2022
2016-04 SAP SE. All rights reserved. 1430
Note 2177996 – Transaction PFCGMASSVAL
Mass maintenance of authorization values in roles
Caution:
• Run Simulation first always
• Use the selection options carefully – most
likely you do not want to turn status
‚Standard‘ and ‚Maintained‘ into ‚Changed‘.
• You can adjust derived roles using PFCG →
Authorizations → Adjust derived roles
Available with Support Packages for SAP_BASIS: Or use SNOTE plus manual modifications as of:
7.02 SP 18 7.02 SP 14
7.31 SP 18 7.31 SP 09
7.40 SP 14 7.40 SP 04
7.50 SP 02 7.50 SP –
Implement note 2263899, too. see note 1842231
© 2022
2016-04 SAP SE. All rights reserved. 1431
Release 7.31 & 7.40: Improvement for ABAP Role Management
→ Utilities → Settings
→ Set the option to use ALV Tree
© 2022
2016-04 SAP SE. All rights reserved. 1432
Release 7.31 & 7.40: Improvement for ABAP Role Management
Note 2086293 - PFCG: Display of deleted authorizations and values for merging of authorizations
© 2022
2016-04 SAP SE. All rights reserved. 1433
Release 7.31 & 7.40: Improvement for ABAP Role Management
In addition to the standard subtree options Collapse/Expand, Print, and Layout, the toolbar of the ALV tree
contains the following pushbuttons:
• Edit: A submenu with various functions appears, depending on the selected row. The most significant
of these are:
• Mass Changes for Authorizations: You can use mass maintenance to change the field values of
multiple authorizations for an authorization field, with the exception of authorization objects and
authorization fields whose authorizations can only be maintained using special dialogs.
• Search & Expand: You use this function to search for authorization objects or fields. The
authorizations that are found are automatically expanded. You also have the option of expanding all
'Open', 'New', 'Changed', or 'Maintained' authorizations.
• Table View of Authorization Values: All authorization values of a field are displayed in a row. However,
each from-to value is displayed in its own row in the table view.
• Full Screen On/Off: When authorization data is merged, an additional window is displayed with deleted
authorizations and values. You can hide or show the window and define whether to arrange it vertically
or horizontally.
© 2022
2016-04 SAP SE. All rights reserved. 1434
Release 7.31 & 7.40: Improvement for ABAP Role Management
© 2022
2016-04 SAP SE. All rights reserved. 1435
March 2016
Topics March 2016
© 2022
2016-03 SAP SE. All rights reserved. 1437
Switchable Allowlists (SLDW)
Note 1973081 - XSRF vulnerability: External start of transactions with OKCode
Allowlist BC_CHECK_EXT_SKIP_FIRST_SCREEN
Purpose: Disable start of transactions with OKCode skipping the first screen.
All GUI variants are affected: SAPGUI fur Windows (SAP Shortcuts), SAPGUI for Java, HTML-GUI
Allow listing is available in NetWeaver 740 SP08 and for releases 700 to 731 by
Note 2055468 - XSRF protection downport (SAP_BASIS Support Package + Kernel as of 7.21)
Recommendation: Activate empty allowlist with status D (All transactions and function codes that are
executed using shortcuts, start transactions, and URLs in the system are logged. New entries are
flagged as not permitted.)
© 2022
2016-03 SAP SE. All rights reserved. 1438
Spotlight News
Important security fixes for Startup Service, Startup Framework and Internet Communication Manager
(March 2016)
In an upcoming IT- Security Conference this week (Troopers, 14th – 18th March 2016), there is a presentation
planned on vulnerabilities affecting SAP NetWeaver.
SAP Security Note 2256185 – Potential Denial of Service in SAP Internet Communication Manager
An attacker can remotely exploit SAP Internet Communication Manager, rendering it, and potentially the resources
that are used to serve SAP Internet Communication Manager, unavailable.
Important security fix for SAP Visual Enterprise Author, Generator, and Viewer 8.0 (February 2016)
2281195 - Potential remote termination of running processes in SAP Visual Enterprise Author, Generator and
Viewer
An attacker can remotely exploit SAP Visual Enterprise Author, Generator and Viewer version 8.0, which may lead
to application termination.
© 2022
2016-03 SAP SE. All rights reserved. 1439
Notes 870127 2260323 2258786 - Internet Communication Manager (ICM)
© 2022
2016-03 SAP SE. All rights reserved. 1440
Note 2260344 - Code injection vulnerability in SCTC_* Function
modules
Similar case from November 2015: Note 2197100 - OS injection through call of function by SE37
© 2022
2016-03 SAP SE. All rights reserved. 1441
Note 2251231 - File validation enforcement switch for empty
physical path
© 2022
2016-03 SAP SE. All rights reserved. 1442
Note 2251231 - File validation enforcement switch for empty
physical path
Both notes basically ask for the same like note 2233617 - Security Vulnerabilities in SAP Download
Manager:
Tell your IT team
➢ to delete / deinstall any existing version DLManager.jar of the SAP Download Manager from their
PCs
and
➢ get and use only the new version from https://support.sap.com/software/download-manager.html
© 2022
2016-03 SAP SE. All rights reserved. 1444
Note 1553180 - Missing authorization check in TH_POPUP
© 2022
2016-03 SAP SE. All rights reserved. 1447
February 2016
Topics February 2016
Note 2141744 - SysRec: manual status is lost and replaced with status 'new‘
Note 2281111 - SysRec: recover the status
Note 2236289 BC-DB-MSS Missing authorization check in SMSS_GET_DBCON
Notes 1491645 1498973 2187502 - Renewing RFC trust relationships
Note 2266565 - SAPSSOEXT process crash during ticket verification
Note 2024431 - TDDAT adjustment in customer landscape
© 2022
2016-02 SAP SE. All rights reserved. 1449
Note 2141744 - SysRec: manual status is lost and replaced with status 'new'
Note 2281111 - SysRec: recover the status (if possible)
Within application System Recommendations of the SAP Solution Manager 7.1 you have set manually
the status of a note to status 'to be implemented', 'irrelevant', or 'postponed'. After some time the status
is resetted to status 'new'.
You manual status is lost if following events had happened:
1. You set the status manually in SysRec.
2. SAP changes the note (with or without creating a new version of the note).
3. SAP triggers full re-calculation for SysRec on the SAP backbone.
4. The background job of SysRec is executed in the SAP Solution Manager.
Solution:
• Implement the note correction or update the support package.
• No manual status is touched anymore with following exception for notes having automatic
correction instructions for ABAP: If you have implement a specific version of a note using the Note
Assistant, transaction SNOTE, you will get the status 'implemented (new version available)'.
© 2022
2016-02 SAP SE. All rights reserved. 1450
Note 2236289 BC-DB-MSS Missing authorization check
© 2022
2016-02 SAP SE. All rights reserved. 1451
Notes 1491645 1498973 2187502 - Renewing RFC trust relationships
Report RS_SECURITY_TRUST_RELATIONS shows the existing RFC trust relationships of and for the
system with the specification of the security level and the option to delete individual trust relationships
to systems that your own system trusts.
Report RS_UPDATE_TRUST_RELATIONS renews (converts) the trust relationships of systems that trust
your own system. Prerequisites get checked automatically.
© 2022
2016-02 SAP SE. All rights reserved. 1452
Note 2266565 - SAPSSOEXT process crash during ticket verification
The problem occurs in SAPSSOEXT version prior to patch 15. If you use SAPSSOEXT as library in a
non-SAP environment you can check for the version with API method "MySapGetVersion".
Maybe it’s faster to check the file version, e.g. for Win 64 Release 721:
• sapssoext version 14 = file version 7210.617.24.58424 changelist 1631288
• sapssoext version 15 = file version 7210.621.25.4608 changelist 1643008
The library API is compatible to older versions, therefore you can simply replace the shared library
"sapssoext.dll" (windows) / "libsapssoext.so" (linux/unix) in your system. See also SAP Note 304450.
https://support.sap.com/swdc
→ Support Packages and Patches
→ Browse our Download Catalog
→ SAP Technology Components
→ SAPSSOEXT
© 2022
2016-02 SAP SE. All rights reserved. 1453
Note 2024431 - TDDAT adjustment in customer landscape
Comparison of Table Authorization Group Assignment
As part of standard corrections using SAP Notes or Support Packages, adjustments to table
authorization group assignments were delivered.
However, it is not possible for SAP to change existing table entries by means of a Support Package.
The report TDDAT_COMPARE compares the table authorization group assignments delivered by SAP by
means of Support Packages with the data in your system.
In addition to the comparison state, the result list displays the relevant SAP Note number and the
corresponding application component. We recommend that you use this report after importing a
Support Package to check the table authorization group assignment.
© 2022
2016-02 SAP SE. All rights reserved. 1454
Note 2024431 - TDDAT adjustment in customer landscape
Comparison of Table Authorization Group Assignment
Correction notes:
Note 2273583 - TDDAT_COMPARE | Error in database update
Note 2079497 - Table authorization group assignment in user management and authorization
management
Note 1645260 - Extended maintenance of table authorization groups
© 2022
2016-02 SAP SE. All rights reserved. 1455
Note 2024431 - TDDAT adjustment in customer landscape
Comparison of Table Authorization Group Assignment
For more fine granular access control we recommend to remove authorization on S_TABU_DIS for
business users at all and use the authorization object S_TABU_NAM instead.
Related notes:
1481950 - New authorization check for generic table access
1434284 - FAQ| Authorization concept for generic table access
1500054 - Additional tools for S_TABU_NAM authorization concept
Report SUSR_TABLES_WITH_AUTH shows which tables can be accessed by a user (if SE16 can be
called).
Transaction SU24_S_TABU_NAM reduces the effort required for maintaining authorization default
values during the introduction of an authorization concept with S_TABU_NAM.
© 2022
2016-02 SAP SE. All rights reserved. 1456
Note 2024431 - TDDAT adjustment in customer landscape
Comparison of Table Authorization Group Assignment
Report RDDPRCHK (or old report RDDTDDAT_BCE) or checks technical properties of tables and views.
If you maintain assignments to table authorization groups, we recommend to have a look to the
environment of the tables as well:
• Check not only specific tables but all tables of a package or application component
• The authorization groups of views usually should match to the authorization groups of the
corresponding base tables
• Validate assignment of table authorization group (Which authorization gets checked for
S_TABU_DIS? – But go for S_TABU_NAM anyway.)
• Validate table maintenance options (Can you use SE16/SM30 to maintain table content?)
• Validate table logging settings (see profile parameter rec/client)
Important packages:
SUSR* User account data including password hash
SCRX RFC Destinations including secret key for Trusted RFC
SECF Content of PSEs
© 2022
2016-02 SAP SE. All rights reserved. 1457
January 2016
Topics January 2016
© 2022
2016-01 SAP SE. All rights reserved. 1459
KBA 2253549 - The SAP Security Baseline Template & ConfigVal
An SAP Security Baseline is a regulation on minimum security requirements to be fulfilled for all SAP
systems in your organization.
"Baseline" means: These requirements must be fulfilled by all SAP systems regardless of any risk
assessments. They are general best practices and apply to all systems, regardless of their security
level.
The SAP Security Baseline Template is a template document provided by SAP on how an
organization-specific SAP Security Baseline could be structured. It is pre-filled with selected baseline-
relevant requirements and corresponding concrete values as recommended by SAP.
https://support.sap.com/sos
→ Media Library
CoE Security Services - Security Baseline Template Version
https://support.sap.com/dam/library/SAP%20Support%20Portal/support-programs-services/support-
services/security-optimization-service/media/Security_Baseline_Template.zip.
© 2022
2016-01 SAP SE. All rights reserved. 1460
KBA 2253549 - The SAP Security Baseline Template & ConfigVal
© 2022
2016-01 SAP SE. All rights reserved. 1461
Switchable Allowlists (SLDW)
Project plan
© 2022
2016-01 SAP SE. All rights reserved. 1462
Switchable Allowlists (SLDW)
Get Framework
Documentation note 1922712 - SLDW: FAQ: Supplementary notes for whitelist maintenance
and http://help.sap.com/saphelp_nw74/helpdata/en/0d/4e0a72085a43a08d66e1e128365156/content.htm
Installation instructions:
note 1919573 - SLDW: Environment for maintaining switchable whitelists SAP_BASIS
note 1922705 - SLDW: Supplementary corrections SLDW framework
note 2054522 - SP implementation dependency with BASIS (SACF) corrections 700 SAPKB70032 (33)
note 2061628 - SLDW: Transport connection for new whitelists 701 SAPKB70117 (18)
(You may want to implement 702 SAPKB70217 (18)
710 SAPKB71019 (21)
note 2211884 - SLDW|Optimization when saving whitelists 711 SAPKB71114 (16)
on top of it.) 730 SAPKB73013 (15)
731 SAPKB73114 (18)
These notes lead to following minimal SAP_BASIS Support Packages which 740 SAPKB74009 (14)
give you the complete framework: 750 SAPK-75001INSAPBASIS
© 2022
2016-01 SAP SE. All rights reserved. 1463
Switchable Allowlists (SLDW)
Activate logging via Security Audit Log
© 2022
2016-01 SAP SE. All rights reserved. 1464
Switchable Allowlists (SLDW)
Activate logging via Security Audit Log
Messages are only written if the Security Audit Log is active and the current filter settings
contain the required messages. You can activate and check this with transaction SM19.
Choose ‘Detail Configuration’, sort the entries, and select messages DUL, DUM and DUN.
Other Events Non-Critical DUL Check for &A in whitelist &B was successful
Other Events Severe DUM Check for &A in whitelist &B failed
Other Events Critical DUN Active whitelist &A changed ( &B )
© 2022
2016-01 SAP SE. All rights reserved. 1465
Switchable Allowlists (SLDW)
Copy SAP definition to active allowlist and adjust log settings
© 2022
2016-01 SAP SE. All rights reserved. 1466
Switchable Allowlists (SLDW)
How to identify notes for installed scenarios
© 2022
2016-01 SAP SE. All rights reserved. 1467
Switchable Allowlists (SLDW)
How to identify notes for not installed scenarios
If you do not have the Support Package yet, you can search notes for sldw or cl_sldw or
check_white_list
© 2022
2016-01 SAP SE. All rights reserved. 1469
Switchable Allowlists (SLDW)
Note 1973081 - XSRF vulnerability: External start of transactions with OKCode
Allowlist BC_CHECK_EXT_SKIP_FIRST_SCREEN
Purpose: Disable start of transactions with OKCode skipping the first screen.
All GUI variants are affected: SAPGUI fur Windows (SAP Shortcuts), SAPGUI for Java, HTML-GUI
Allow listing listing is available in NetWeaver 740 SP08 and for releases 700 to 731 by
Note 2055468 - XSRF protection downport (SAP_BASIS Support Package + Kernel as of 7.21)
Recommendation: Activate empty allowlist with status D (All transactions and function codes that are
executed using shortcuts, start transactions, and URLs in the system are logged. New entries are
flagged as not permitted.)
© 2022
2016-01 SAP SE. All rights reserved. 1470
Note 2248735 - Code injection vulnerability in System
Administration Assistant
Transaction SSAA_TOP
Transaction SSPC = Report RSSPECCA
Report RSRRRSAA
Report RSSAA_CALLEXTERN
Report SAPSAA_HELP
...
© 2022
2016-01 SAP SE. All rights reserved. 1471
Tipp: Performing Configuration Tasks with Task Manager
Transaction STC01
Perform configuration tasks in an automated way by using the task manager for technical
configuration (task manager). The task manager guides you through extensive configuration
processes by means of predefined task lists and offers the possibility to customize them
according to your needs.
Note 1923064 - Initial Setup: System Configuration using ABAP Task Manager
© 2022
2016-01 SAP SE. All rights reserved. 1472
Note 2221986 - Too many privileges assigned to HANA hdbrole
Different software component version HANA RULES FRAMEWORK 1.0 (instead of SAP HANA
DATABASE 1.00).
➢ You install the SAP HANA Rules Framework add-on on top of SAP HANA platform.
➢ You can install or upgrade it independently from a HANA revision upgrade.
➢ References:
Note 2219894 - SAP HANA Rules Framework 1.0 SPS06 Release Note
Documentation about SAP HANA Rules Framework incl. Installation & Upgrade Guide and Security Guide
➢ System Recommendations may or may not know about the software component and therefore may
not show the note.
© 2022
2016-01 SAP SE. All rights reserved. 1473
Note 2151237 - Potential remote code execution in SAP GUI for Windows
SAP uses libraries from Microsoft (Windows common controls) which are bundled with the
SAPGUI installation.
© 2022
2016-01 SAP SE. All rights reserved. 1474
Note 2151237 - Potential remote code execution in SAP GUI for Windows
How to check SAPGUI version
Transaction SM04 = report
RSM04000_ALV respective
RSM04000_ALV_NEW
Report
ZSM04000_SNC from
SCN Blog
Limitation: The reports inspects the current sessions on the current application server only.
… or use z-reports from note 748424 - Evaluation of SAP GUI versions and patches
© 2022
2016-01 SAP SE. All rights reserved. 1475
December 2015
Topics December 2015
© 2022
2015-12 SAP SE. All rights reserved. 1477
Latest questions
Note 2234226 - TREX / BWA: Potential technical information disclosure / host OS compromise
No patch available; use separated network segments to protect internal communication between parts
of the server
➢ Cross-system view
➢ Online Documentation
© 2022
2015-12 SAP SE. All rights reserved. 1480
System Recommendations in SAP Solution Manager 7.2
Personnel Launchpad
© 2022
2015-12 SAP SE. All rights reserved. 1481
System Recommendations in SAP Solution Manager 7.2
System Overview
© 2022
2015-12 SAP SE. All rights reserved. 1482
System Recommendations in SAP Solution Manager 7.2
Note Overview
© 2022
2015-12 SAP SE. All rights reserved. 1483
System Recommendations in SAP Solution Manager 7.2
Advanced Search
© 2022
2015-12 SAP SE. All rights reserved. 1484
System Recommendations in SAP Solution Manager 7.2
Status and Comments
Individual and cross-
system mass status
management possible
© 2022
2015-12 SAP SE. All rights reserved. 1485
System Recommendations in SAP Solution Manager 7.2
Status and Comments
Customizing table
AGSSR_STATUS
© 2022
2015-12 SAP SE. All rights reserved. 1486
System Recommendations in SAP Solution Manager 7.2
Status and Comments
© 2022
2015-12 SAP SE. All rights reserved. 1487
System Recommendations in SAP Solution Manager 7.2
Usage count from UPL/SCMON
© 2022
2015-12 SAP SE. All rights reserved. 1488
Hide Application Components which do not match to used DB or
OS installations
Customizing table
AGSSR_OSDB
© 2022
2015-12 SAP SE. All rights reserved. 1489
Overview about Application Components for DB/OS:
INF BC-DB-INF
INF BW-SYS-DB-INF
© 2022
2015-12 SAP SE. All rights reserved. 1490
General Customizing and Personalization
Transaction SM30_DNOC_USERCFG_SR
SYSREC_STATUS_FILTER (*) Defines which SAP Notes are counted on the overview page: By default it only shows notes with status
'new' or 'new version available' (in use up to 7.2 SP 6).
SYSREC_UPL_ACTIVE (*) Activate/deactivate the integration with UPL/SCMON while showing the object list of ABAP notes.
SYSREC_UPL_MONTH (*) Count of month for which UPL/SCMON data get loaded. The default is 2 which represents the current and
the previous month.
SYSREC_NOTE_TYPES Defines for which types of notes the application calculates results. Enter the list of characters representing
the note types HotNews, Security, Performance, Legal Change, Correction, and License Audit.
SYSREC_LAST_MONTHYEAR Defines the earliest calculated notes. By default the application calculates all SAP Notes which were
released between January 2009 and the current month.
SYSREC_BPCA_USER Defines if the current user should be added as selection for BPCA.
SYSREC_BPCA_DATE Defines the earliest filter for BPCA results. You can change the start date for this period.
SYSREC_CHARM_LOG_TYPE Defines the text id according to table TTXID for the text object CRM_ORDERH.
SYSREC_CHARM_USER Defines if the current user should be added as selection for ChaRM.
SYSREC_CHARM_DATE Defines the earliest filter for ChaRM results. You can change the start date for this period.
SYSREC_OBJECT_EXP Lifetime of the cache which contains the object list of notes. The default is 14 days.
SYSREC_REQ_EXP Lifetime of the cache which contains the required notes of notes. The default is 14 days.
SYSREC_SIDE_EFFECT Lifetime of the cache which contains the side-effect notes of notes. The default is 14 days.
SYSREC_UNSUPPORTED_SYSTEM (*) System types which you want to block from SysRec (one entry per system type)
SYSREC_UNUSED_SUBHR Calculate results for unused HR components (see note 2712210)
(*) User specific personalization
© 2022
2015-12 SAP SE. All rights reserved. 1491
System Recommendations in SAP Solution Manager 7.2
Online Documentation
You find the Online Documentation about System Recommendations in the App section for Fiori
→ Fiori
http://help.sap.com/solman_fiori
System Recommendations
https://help.sap.com/saphelp_smfiori_102/helpdata/en/cb/e401557f614c55e10000000a4450e5/frameset.htm
You will see the following in the transport log (table CWBNTCUST Example:
R3TR NOTE 0001584548
contains the implementation status in field NTSTATUS): R3TR NOTE 0001628606
Start export R3TRNOTE0001584548 ... R3TR NOTE 0001631072
1 entry from TADIR exported (R3TRNOTE0001584548 ). etc.
3 entries from CWBNTCI exported (0001584548*).
0 entries from CWBNTCONT exported (0001584548*).
1 entry from CWBNTCUST exported (0001584548*).
3 entries from CWBNTDATA exported (NT0001584548*).
[…]
End of export R3TRNOTE0001584548
5. Run the note browser of SNOTE, report SCWN_NOTE_BROWSER, and validate the implementation status.
6. With the next run of SysRec‘s background job the note will vanish from the result list.
© 2022
2015-12 SAP SE. All rights reserved. 1493
KBA 2253549 - The SAP Security Baseline Template
An SAP Security Baseline is a regulation on minimum security requirements to be fulfilled for all SAP
systems in your organization.
"Baseline" means: These requirements must be fulfilled by all SAP systems regardless of any risk
assessments. They are general best practices and apply to all systems, regardless of their security
level.
The SAP Security Baseline Template is a template document provided by SAP on how an
organization-specific SAP Security Baseline could be structured. It is pre-filled with selected baseline-
relevant requirements and corresponding concrete values as recommended by SAP.
https://support.sap.com/sos
→ Media Library
CoE Security Services - Security Baseline Template Version
https://support.sap.com/dam/library/SAP%20Support%20Portal/support-programs-services/support-
services/security-optimization-service/media/Security_Baseline_Template.zip.
© 2022
2015-12 SAP SE. All rights reserved. 1494
Note 2233617 - Security Vulnerabilities in SAP Download Manager
(reloaded)
These vulnerabilities can potentially be abused by an attacker to launch man-in-the-middle attacks. Attackers thus
could tamper with the content of software downloads and submit malware of their own while the administrator
assumes to get software from SAP.
Employees who are using the SAP Download Managers should deinstall the existing version and get the new
version from https://support.sap.com/software/download-manager.html
This is a executable jar-file which does not require a
special installation procedure – you simply put it into
any folder:
The most visible change (among others) is that you
connect to the Service Marketplace via an SSL
encrypted channel and that you cannot store
the password anymore (no SSO available):
An error message stops the report for the first missing authorization check.
(In classic General Ledger Accounting report RFSUMB00 is used which is not touched by this note.)
© 2022
2015-12 SAP SE. All rights reserved. 1496
November 2015
Topics November 2015
© 2022
2015-11 SAP SE. All rights reserved. 1498
ONAPSIS Advisories 2015 about SAP HANA (TrexNet)
Note 2165583 - SAP HANA secure configuration of internal communication, August 2015
Release independent solution according to manual instruction, see note 2183363, too
Note 2175928 - Potential remote termination in SAP HANA text engine, August 2015
Solution: revision 85.05 for SPS 8, revision 95 for SPS 9, or SPS 10
Note 2197397 - Potential remote code execution in SAP HANA XS, September 2015
Solution: revision 85.05 for SPS 8, or revision 92 for SPS 9, (SPS 10 is not affected)
© 2022
2015-11 SAP SE. All rights reserved. 1499
Note 2165583 / 2183363 – Secure Configuration of SAP HANA
internal network
The EarlyWatch Alert checks for the SAP HANA Network Settings for Internal Services since mid of
2015 (see EWA note 863362):
© 2022
2015-11 SAP SE. All rights reserved. 1500
Note 2165583 / 2183363 – Secure Configuration of SAP HANA
internal network
The EarlyWatch Alert checks for the SAP HANA Network Settings for Internal Services since mid of
2015 (see EWA note 863362):
The settings for the internal network must be configured in accordance with SAP Note 2183363 for
systems on one or several hosts. The check checks for obvious violations against these
recommendations.
The parameter listeninterface in the section [communication] must have neither the
value .global nor the value .all. If listeninterface has the value .internal, in the section
[internal_host_resolution], no IP addresses must be maintained that can be reached
externally.
The check is carried out by comparing against the values of net_publicname in the
view M_HOST_INFORMATION.
The check triggers EWA alert 21 “SAP HANA Internal Network Configuration is insecure” (red rating),
respective 22 “SAP HANA Internal Network Configuration may lead to future security risks” (yellow
rating).
© 2022
2015-11 SAP SE. All rights reserved. 1501
Note 2197428 - Potential remote code execution in HANA
Fixing the issue requires to upgrade at least to revision 97.03 or 102.1 or higher.
However, in the interim time, the risk can be mitigated by the following measures:
➢ If possible, block direct user access to the HANA system on the network layer, e.g. by appropriate
firewall configuration.
➢ This especially is normally possible for scenarios in which only indirect access to the HANA system is
required e.g. via Business Suite or NetWeaver Gateway.
➢ To our knowledge, attackers who want to exploit the corresponding vulnerabilities, require direct access to
the SAP HANA system, which can be blocked if users need only indirect access via NetWeaver Work
Processes (e.g. Business Suite or BW) or via NetWeaver Gateway.
➢ Actively monitor and respond to HANA dumps.
➢ Attackers are likely to try several attempts which may lead to dumps and thus allow to get alerted on such
activities.
➢ Configure, actively monitor and respond to suspicious activities recorded in the HANA Audit Trail.
➢ Unexpected or malicious activities can be discovered and suitable countermeasures can be taken, if the
HANA Audit Trail (best practice) is set-up and monitored properly.
© 2022
2015-11 SAP SE. All rights reserved. 1502
Security Fixes to Vulnerabilities Reported in SNOTE Application
Re-run of SysRec background job necessary because validity of correction instructions was updated.
For obvious reasons: No testing in test systems or production systems necessary.
© 2022
2015-11 SAP SE. All rights reserved. 1503
Note 2233617 - Security Vulnerabilities in SAP Download Manager
These vulnerabilities can potentially be abused by an attacker to launch man-in-the-middle attacks. Attackers thus
could tamper with the content of software downloads and submit malware of their own while the administrator
assumes to get software from SAP.
Employees who are using the SAP Download Managers should deinstall the existing version and get the new
version from https://support.sap.com/software/download-manager.html
This is a executable jar-file which does not require a
special installation procedure – you simply put it into
any folder:
The most visible change (among others) is that you
connect to the Service Marketplace via an SSL
encrypted channel and that you cannot store
the password anymore (no SSO available):
Think big: “No development activities or low level test tools in production systems”
➢ Strictly control access to SE37 and to authorizations for S_DEVELOP for object type FUGR and
activity 16 = execute (and all change activities)
➢ Strictly control access to SE24 and to authorizations for S_DEVELOP for object type CLAS and
activity 16 = execute (and all change activities)
➢ Control access to authorization object S_C_FUNCT and function name SYSTEM
➢ Try to control access to authorization object S_DATASET (but that’s a quite different story)
© 2022
2015-11 SAP SE. All rights reserved. 1505
Note 1611408 - Missing authorization check in SD-SLS
© 2022
2015-11 SAP SE. All rights reserved. 1506
Delta-mode vs. full calculation in System Recommendations
© 2022
2015-11 SAP SE. All rights reserved. 1507
October 2015
Topics October 2015
© 2022
2015-10 SAP SE. All rights reserved. 1509
Note 1677810 - Unauthorized modification in ITS-Service in IS-U-WA
• Update in September 2015 to tell that the repair report which you get via the note has to be
executed (if you do not use the Support Package)
• Only necessary in development system because the correction will be added to a transport
• Do not use the XPRA tip at all (I guess it will not work for this note anyway)
• If you never have installed a Support Package since 3 years, you have many more security
risks than this one
• Conclusion: Nothing to do now – except to check if you regularly run Support Package
upgrades
© 2022
2015-10 SAP SE. All rights reserved. 1510
Note 2189853 - SAP Internet Communication Framework fails to
validate HTTP_WHITELIST
“Attention: Before applying the correction make sure that the configuration of table HTTP_WHITELIST
in the target clients other than client "000" meets your requirements!”
➢ Check entries in client 000 using SE16(*) and decide which you have to move to the productive
client(s).
➢ Keep in mind that public services from node default_host/sap/public stay in client 000 !
(*) SM30 does not work for tables containing string fields. Instead of SE16 you can use report RS_HTTP_WHITELIST as of release 7.31.
© 2022
2015-10 SAP SE. All rights reserved. 1511
Note 2189853 - SAP Internet Communication Framework fails to
validate HTTP_WHITELIST
Related notes:
Note 2032237 - Using CHECK_HTTP_WHITELIST for server-relative URLs
Note 2193214 - Potential false redirection of Web site content in SAP Internet Communication
Framework
Note 2223891 - How to configure HTTP_WHITELIST table for public services
Solution:
© 2022
2015-10 SAP SE. All rights reserved. 1513
Example for very old note having manual instructions:
Note 1445998 - Disabling invoker servlet
Good news: The Invoker Servlet has been disabled by default as of release 7.20.
But: In case of older systems you have to disable the vulnerable feature manually by changing
the value of EnableInvokerServletGlobally property of servlet_jsp service on the server
nodes to false.
Open questions:
Solution:
“To fix the vulnerability of CommonCryptoLib version 8.4.38, install CommonCryptoLib version 8.4.39
or later. CommonCryptoLib versions 8.4.37 or previous are not affected.”
Comments:
Only a single version of the CommonCryptoLib is affected.
The application System Recommendations cannot show this note because the CommonCryptoLib is
not known in LMDB/SLD.
© 2022
2015-10 SAP SE. All rights reserved. 1515
Note 2080378 - Transaction STRFCTRACE
Evaluation of RFC statistic records
Do you know the Blog How to get RFC call traces to build authorizations for S_RFC for free!
STRFCTRACE
© 2022
2015-10 SAP SE. All rights reserved. 1516
Note 2080378 - Transaction STRFCTRACE
Evaluation of RFC statistic records
© 2022
2015-10 SAP SE. All rights reserved. 1517
August 2015
Topics August 2015
© 2022
2015-08 SAP SE. All rights reserved. 1519
Some words about System Recommendations
https://scn.sap.com/community/abap/blog/2015/06/28/chrome-extension-to-highlight-abap-correction-instructions-in-sap-notes
https://chrome.google.com/webstore/detail/sap-note-enhancer/keibkcomemkcceddcddjdlncidohgedk
© 2022
2015-08 SAP SE. All rights reserved. 1522
Note 1611408 - Missing authorization check in SD-SLS
The note was re-released because the false assignment for release 606 was deleted
→ Very old note, no need to care about it anymore
© 2022
2015-08 SAP SE. All rights reserved. 1523
Note 1922205 - Authorization default value in BC-XI-IS-WKB
© 2022
2015-08 SAP SE. All rights reserved. 1524
Note 1952092 - Code injection vulnerability in IDES systems
Did you ever have applied security patches or other security controls to such systems?
Depending on the answer, you know what to do with this note.
General rule for Demo Systems: No connections in SM59 from/to productive systems
© 2022
2015-08 SAP SE. All rights reserved. 1525
Note 2179384 - Traffic control: Wrong request transfer rate
calculation
J. G.: Hallo Herr Buchholz, beim letzten Webinar im April hatten wir über den Hinweis 1981955 - "Minimale Datenübertragungsraten für Anfragen in
SAP Web Dispatcher und ICM erzwingen" gesprochen. Anfang Juni habe ich vom AGS die Aussage, dass die Implementierung seit ihrer
Auslieferung fehlerhaft ist. Die Übertragungsrate wird nicht korrekt ermittelt und somit werden die meisten Verbindungen mit "Traffic control
condition" (im dev_icm) abgeblockt. Der Hinweis ist immer noch verfügbar und noch nicht aktualisiert.
© 2022
2015-08 SAP SE. All rights reserved. 1526
Note 2182842 - Potential information disclosure relating to SAP
Customizing
Security Note 2182842 refers to normal note 1859065 which undo's the critical change made by note
1814956.
If you haven't implements note 1814956 you need note 1859065 only in SAP_BASIS release 731 SP 8
and 740 SP 3 because both notes are part of the same SP in other releases:
Support Package assignments:
Note 1814956 Note 1859065
700 SAPKB70029 700 SAPKB70029
701 SAPKB70114 701 SAPKB70114
702 SAPKB70214 702 SAPKB70214
710 SAPKB71017 710 SAPKB71017
711 SAPKB71112 711 SAPKB71112
720 SAPKB72008 720 SAPKB72008
730 SAPKB73010 730 SAPKB73010
731 SAPKB73108 731 SAPKB73109 → SP 8 is affected
740 SAPKB74003 740 SAPKB74004 → SP 3 is affected
© 2022
2015-08 SAP SE. All rights reserved. 1527
SAP Security Notes Advisory by SAP Consulting
© 2022
2015-08 SAP SE. All rights reserved. 1529
Note 2174357 - Reflected File Download Vulnerability in KM
Documents Servlet
Note 2122578 - New: Security Audit Log event for unencrypted GUI / RFC connections
Note 2029397 - Missing authorization checks for RFC in E-commerce ERP applications
Note 2057982 - Hardcoded credentials in BC-SRV-DX-DXW
Note 2059659 - Hardcoded credentials in BC-CUS-TOL-CST
Note 2122247 - Data missing from table TCDOB following import of EHPs
© 2022
2015-07 SAP SE. All rights reserved. 1532
Note 2122578 - Security Audit Log event for unencrypted GUI / RFC
Let's assume you run a staged project to encrypt all communication channels (Example: GUI):
1. Enable servers to accept encrypted communication requests
… but unencrypted communication is still allowed
(snc/enable = 1 and snc/accept_insecure_gui = 1)
2. Enable clients to initiate encrypted communication requests
… but unencrypted communication is still allowed
3. After checking that all communication channels are encrypted:
Enforce servers to only accept encrypted communication requests
(snc/enable = 1 and snc/accept_insecure_gui = 0)
© 2022
2015-07 SAP SE. All rights reserved. 1533
Note 2122578 - Security Audit Log event for unencrypted GUI / RFC
© 2022
2015-07 SAP SE. All rights reserved. 1534
Note 2122578 - Security Audit Log event for unencrypted GUI / RFC
Now you can use the Security Audit Log (SM19 / SM20) to log unencrypted communication for SAPGUI
and RFC.
Transaction SM19
→…
→ Detailed Configuration
→ Log Message BUJ
Prerequisite: Note 2104732 - SAL - event definition for SNC client encryption
Analysis and Recommended Settings of the Security Audit Log (SM19 / SM20)
http://scn.sap.com/docs/DOC-60743
© 2022
2015-07 SAP SE. All rights reserved. 1535
Note 2029397 - Missing authorization checks for RFC in E-
commerce ERP applications
© 2022
2015-07 SAP SE. All rights reserved. 1536
Note 2057982 - Hardcoded credentials in BC-SRV-DX-DXW
Note 2059659 - Hardcoded credentials in BC-CUS-TOL-CST
© 2022
2015-07 SAP SE. All rights reserved. 1537
Note 2122247 - Data missing from table TCDOB and TDDAT
following import of EHPs
Solution
Use at least SUM 1.0 SP12 Patch Level 4 or a higher SUM version.
If you are affected, change documents may be incomplete, as well as the authorization checks for
generic table access. In this case, contact SAP Support directly.
Logging of table access using standard tools like SE16, SM30, SM31, SM34, SQVI:
Activate the message DU9 (of group transaction start, not critical) in the Security Audit Log.
Message: „Generic table access call to &A with activity &B (auth. check: &C )”
© 2022
2015-07 SAP SE. All rights reserved. 1538
June 2015
Topics June 2015
Note 2183624 - Potential information leakage using default SSFS master key in HANA
Note 1997734 - Missing authorization check in Trusted-RFC runtime
Note 2144333 - Missing authorization check in CRM-LAM
Note 2163306 - Fixing FREAK vulnerability in CommonCryptoLib and SAPCRYPTOLIB
Note 2099484 - Missing authorization check in Payment Engine
Note 1749142 - How to remove unused clients including client 001 and 066
© 2022
2015-06 SAP SE. All rights reserved. 1540
Note 2183624 - Potential information leakage using default SSFS
master key in HANA
Spotlight-News
Last week we saw a conference talk and a few press articles related to an alleged default security
configuration in SAP HANA installations.
Our recommendation is to change the default main keys that are issued with SAP HANA installations
as described in SAP security note 2183624. This is valid as of HANA SPS 06.
The SSFS main key is used to encrypt the root encryption keys of your SAP HANA database. It is a
default key that is the same for all installations unless explicitly changed. SAP therefore highly
recommends that you change this key immediately after installation or after you have received SAP
HANA pre-installed from a database vendor.
If the key was not changed after installation, we recommend that you perform the key change in the
next available maintenance window.
For more detailed information we recommend you create a customer incident on component HAN-DB-SEC.
Customers requiring consulting support in regards to their installations are welcome to contact SAP Security
Consulting following SAP Note 114045.
© 2022
2015-06 SAP SE. All rights reserved. 1541
Note 2183624 - Potential information leakage using default SSFS
master key in HANA
© 2022
2015-06 SAP SE. All rights reserved. 1542
Note 1997734 - Missing authorization check in Trusted-RFC runtime
© 2022
2015-06 SAP SE. All rights reserved. 1543
Note 1997734 - Missing authorization check in Trusted-RFC runtime
© 2022
2015-06 SAP SE. All rights reserved. 1544
Note 1997734 - Missing authorization check in Trusted-RFC runtime
Note that due to its highly critical nature, S_RFCACL is not part of SAP_ALL.
© 2022
2015-06 SAP SE. All rights reserved. 1545
Note 1997734 - Missing authorization check in Trusted-RFC runtime
© 2022
2015-06 SAP SE. All rights reserved. 1546
Note 1997734 - Missing authorization check in Trusted-RFC runtime
© 2022
2015-06 SAP SE. All rights reserved. 1547
Note 1997734 - Missing authorization check in Trusted-RFC runtime
© 2022
2015-06 SAP SE. All rights reserved. 1548
Note 2144333 - Missing authorization check in CRM-LAM
The note introduces the transaction start authority check for S_TCODE for some reports which have
corresponding report transactions.
Report New authorization check for Transaction
CRM_FS_ASSET_CREATE CRM_FS_ASSET Asset Handling and Depreciation
CRM_FS_CALC_CASH_FLOW CRM_FS_CALC Calculation of Cash Flow
CRM_FS_FRA_EXECUTE CRM_FS_FRA Floating Rate Adjustment
CRM_FS_INTEREST_ADJUSTMENT CRM_FS_INTADJ Interest Rate Adj. of Leasing Docs
CRM_FS_INTADJ_ANALYSIS_DISPLAY CRM_FS_INTADJ_DISP Disp. Eval. for Interest Rate Adj.
CRM_FS_TQ_MASS_RUN CRM_FS_TQ_MASS_RUN Mass Run for Termination Quotation
CRM_FS_MASS_CHANGE CRMC_FS_MASS_CHANGE Start Mass-Changes
Other security note about same topic “Report Transactions”: Note 2157877, 2157877
© 2022
2015-06 SAP SE. All rights reserved. 1549
Note 2144333 - Missing authorization check in CRM-LAM
Example
Mitigation:
Do not allow access to transactions like SA38
which allow to submit any report.
© 2022
2015-06 SAP SE. All rights reserved. 1550
Note 2163306 - Fixing FREAK vulnerability in Crypto-Library
Report execution in Application Configuration Validation for Config Stores PSE_CERT and J2EE_PSE_CERT:
Result:
© 2022
2015-06 SAP SE. All rights reserved. 1553
Note 2099484 - Missing authorization check in Payment Engine
Another part is about adding authorization checks to functions (see manual correction instruction, too):
*>>>> START OF INSERTION <<<<
* Check Authorizations.
CHECK /pe1/cl_bpe_authority_checks=>check_authority_order(
i_requested_activity = con_actvt_create
i_clearing_area = space ) = abap_true.
➢ Check if you are using remote interfaces which call the Payment Engine and verify if the (technical)
users calling these BAPIs have authorizations for /PE1/* authorization objects
© 2022
2015-06 SAP SE. All rights reserved. 1554
Note 1749142 - How to remove unused clients including client 001
and 066
You have to secure any client even if it is not used. This includes the security settings of standard
users like SAP* or DDIC or EARLYWATCH which might still have well-known standard passwords as
well as the security of any other (powerful) users.
Because of this you can reduce maintenance effort and increase the security of a system if you
remove unused clients.
See blog: How to remove unused clients including client 001 and 066
http://scn.sap.com/community/security/blog/2013/06/06/how-to-remove-unused-clients-including-client-001-and-066
Client 066 is not used by SAP for a while and will not be used anymore.
Meanwhile the final obstacle which had hindered us to publish the official note 1749142 is solved:
Software Update Manager 1.0 SP13 does not request client 066 anymore during upgrade.
© 2022
2015-06 SAP SE. All rights reserved. 1555
May 2015
Topics May 2015
© 2022
2015-05 SAP SE. All rights reserved. 1557
Note 1595582 - Deletion of temporary RFC destinations
Note 1750618 - RFC destinations created in SMSU_MANAGED_SYSTEM
The job SM:REMOVE TEMPORARY RFC removes such temporary RFC destinations. It should be
scheduled every hour. In general the scheduling is done in Basic Configuration.
Workaround: Directly delete the RFC destination in transaction SM59.
© 2022
2015-05 SAP SE. All rights reserved. 1558
Note 2113995 - Missing authentication check in SAP ASE
This issue has been fixed in the following SAP ASE versions:
SAP ASE 16.0 SP01
SAP ASE 15.7 SP132
Install the fixed SAP ASE versions most appropriate for your production environments.
© 2022
2015-05 SAP SE. All rights reserved. 1559
Note 2078596 - SACF: Switchable Authorization (RFC) Scenarios
(reloaded)
The following SAP Notes contain new switchable authorization checks in RFC:
May 2015:
Note 2152230 - Switchable authorization checks for RFC in Reconciliation Report Scheduler
Scenario HRPAYUS_RECON
Note 2053788 - Missing authorization check in RFC enabled function module - BC-MOB-MI-SER
Scenario BC_MI_RFC_CHECK
© 2022
2015-05 SAP SE. All rights reserved. 1560
Note 2078596 - SACF: Switchable Authorization (RFC) Scenarios
(reloaded)
The following SAP Notes provides solution which do not require a switch:
May 2015:
Note 2043447 - Missing authorization check in SV-SMG-BPCA
Note 2052677 - Possible code injection and missing RFC authentication
Note 2053043 - Missing RFC authorization in eCATT Extended Computer Aided Test Tool
Note 2053197 - ChaRM: Missing authorization check in SV-SMG-CM
Note 2058351 - Missing authorization check in BC-VMC
Note 2066851 - Missing authority-check vulnerability in the OCS functionality
Note 2066943 - New authorization check for RFC in component WEC-APP-UM
Note 2067630 - DBA Cockpit: Missing authorizations during administration of jobs and scripts
Note 2105620 - Missing authorization check in Calendar Interface
Note 2105633 - Missing authorization check in Alert Management Interface
Note 2105634 - Missing authorization check in ALE Interface
Note 2118500 - Missing authorization check in SAP Records Management
Note 2122022 - Missing authorization check in function RSPO_R_SAPGPARAM
Note 2131334 - Missing authorization check in Process Monitoring Infrastructure
Note 2138031 - Missing authorization check in BC-BMT-WFM
Note 2138219 - Missing authorization check in BC-BMT-WFM
Note 2140238 - Missing authorization check in BC-XI-IS-BPE
Note 2143329 - Missing authorization check in RDDPUTJZ_COPY_TRANSPORT
Note 2149278 - Missing authorization check in SAP Records Management
© 2022
2015-05 SAP SE. All rights reserved. 1561
Current notes about System Recommendations
Note 2099728 - SysRec: Object list for ABAP notes does not show Usage Procedure Logging
Note 2137673 - SysRec: filter completed implemented SAP Notes
Note 2141744 - SysRec: changed status lost
reloads 2025144 - SysRec: enhancement for RFC to managed system and switch framework
Note 2146340 - SysRec: dump in automatic check
Note 2150787 - SysRec: missing system in reporting
KBA 2126621 - SysRec: Requirement before opening incident for System Recommendation
KBA 2117439 - SysRec: Notes related to HR sub component are not presented
KBA 2041071 - SysRec: How to download latest Java patches using System Recommendation
SysRec → Choose Java Patches, then use MopZ
Tipp: Call System Recommendations for the Solution Manager System, filter by Application
Component SV-SMG-SR and search for Correction Notes
© 2022
2015-05 SAP SE. All rights reserved. 1562
KBA 2126621 - SysRec: Requirement before opening incident for
System Recommendation
© 2022
2015-05 SAP SE. All rights reserved. 1563
LZC/LZH Compression Multiple Vulnerabilities
Memory corruption vulnerabilities CVE-2015-2282, CVE-2015-2278
Note 2121661 - Potential remote termination of running processes in ABAP & Java Server
Note 2124806 - Potential remote termination of running processes in SAP GUI
Note 2125316 - Potential termination of running processes in SAPCAR
Note 2127995 - Potential remote termination of running processes in Content Server
© 2022
2015-05 SAP SE. All rights reserved. 1564
LZC/LZH Compression Multiple Vulnerabilities
Memory corruption vulnerabilities CVE-2015-2282, CVE-2015-2278
© 2022
2015-05 SAP SE. All rights reserved. 1565
LZC/LZH Compression Multiple Vulnerabilities
Memory corruption vulnerabilities CVE-2015-2282, CVE-2015-2278
© 2022
2015-05 SAP SE. All rights reserved. 1566
LZC/LZH Compression Multiple Vulnerabilities
Memory corruption vulnerabilities CVE-2015-2282, CVE-2015-2278
© 2022
2015-05 SAP SE. All rights reserved. 1567
LZC/LZH Compression Multiple Vulnerabilities
Memory corruption vulnerabilities CVE-2015-2282, CVE-2015-2278
http://www.coresecurity.com/advisories/sap-lzc-lzh-compression-multiple-vulnerabilities
The published example refers to the Open Source versions of MaxDB but not the SAP MaxDB.
© 2022
2015-05 SAP SE. All rights reserved. 1568
April 2015
Topics April 2015
© 2022
2015-04 SAP SE. All rights reserved. 1570
Notes 1769064 und 931252
Profile Parameter auth/rfc_authority_check
0 = No authorization check
1 = Authorization check active (no check for same user)
(no check for same user context and function group SRFC)
2 = Authorization check active (no check for function check SRFC)
3 = Logon required for all function modules except RFC_PING and RFC_SYSTEM_INFO
(no authorization check)
4 = Authorization check required for all function modules except RFC_PING and
RFC_SYSTEM_INFO
5 = Logon required for all function modules except RFC_PING (no authorization check)
6 = Authorization check required for all function modules except RFC_PING
8 = Logon required for all function modules (no authorization check)
9 = Authorization check active (SRFC-FUGR also checked)
© 2022
2015-04 SAP SE. All rights reserved. 1572
Notes 1769064 und 931252
Profile Parameter auth/rfc_authority_check
RFC enabled function modules of function
group SRFC :
RFC_GET_LOCAL_DESTINATIONS
RFC_GET_LOCAL_SERVERS
RFC_PING
RFC_PUT_CODEPAGE
RFC_SYSTEM_INFO
SYSTEM_FINISH_ATTACH_GUI
SYSTEM_INVISIBLE_GUI
SYSTEM_PREPARE_ATTACH_GUI
SYSTEM_RFC_VERSION_3_INIT
© 2022
2015-04 SAP SE. All rights reserved. 1573
[Troopers 2015] RFC callback - A Backdoor in Wonderland
Replace the existing “Classical RFC Library” (librfc32) with the corresponding patch listed in this note.
You do not need to upgrade the whole Kernel. However, you not only should replace the library which
is installed together with the Kernel in folder DIR_EXECUTABLE but any “Classical RFC Library” which
is used by any external RFC server or RFC client anywhere in the file system.
Actually it’s more important to update these other installations! SAP KERNEL 7.20 patch 715
References: SAP KERNEL 7.21 patch 332
SAP KERNEL 7.43 patch 11
Note 27517 explains the installation of the “Classical RFC Library”
Note 413708 explains how to verify the version of the RFC library.
Note 1005832 shows an Overview on all RFC Libraries and SDKs.
The “SAP NetWeaver RFC Library” is different and not affected by the security vulnerability.
Note 1025361 describes the Installation, Support and Availability of the “NetWeaver RFC library”.
© 2022
2015-04 SAP SE. All rights reserved. 1575
Note 2084037 - Potential information disclosure relating to RFC SDK
Example (Linux) how to check the version of the RFC library using report RSBDCOS0 :
Show list of files: ls $(DIR_EXECUTABLE)/librfc*
Show version: strings $(DIR_EXECUTABLE)/librfcum.so grep "LIBRFC"
Command on
Unix: what
Linux: strings
© 2022
2015-04 SAP SE. All rights reserved. 1576
Note 2084037 - Potential information disclosure relating to RFC SDK
Example (Windows) how to check the version of the RFC library using report RSBDCOS0 :
Show list of files: dir $(DIR_EXECUTABLE)\librfc*.dll
Show version: find "LIBRFC" $(DIR_EXECUTABLE)\librfc32u.dll
© 2022
2015-04 SAP SE. All rights reserved. 1577
Note 2084037 - Potential information disclosure relating to RFC SDK
Example (Windows) how to check the version of the RFC library using report RSBDCOS0 :
for %f in ($(DIR_EXECUTABLE)\librfc*.dll) do find "LIBRFC" %f
© 2022
2015-04 SAP SE. All rights reserved. 1578
Note 2140700 - Potential termination of HANA client (hdbsql)
© 2022
2015-04 SAP SE. All rights reserved. 1579
Note 2121869 - Potential information disclosure relating to NW
Application Server and BW
What happens if only one or two of these parts (BEx backend, BEx frontend, SAP GUI) are installed?
Does the order of implementation matters?
• If only the SAP GUI part is available, there’s no improvement at all.
• If only the BEx part is available without the SAP GUI part, in worst case the connection will not be
established automatically via t-code RRMX. We assume this is still better than establishing an
unencrypted connection.
• Both BEx parts are needed: Implement note with transaction SNOTE and execute an frontend
upgrade. If only a part of the BEx Correction is available, let’s say only the backend part,
• in case of SNC + SSO, the connection will be established using the the assertion ticket only and therefore
will be unencrypted
• in case of SNC w/o SSO, the connection via RRMX will fail and the logon screen will be displayed.
Note 2096517 describes the SAP GUI part.
Related Note 2122840 - Logon Control: Issue with login when SNC configuration is done.
© 2022
2015-04 SAP SE. All rights reserved. 1580
Note 1966655 - Potential denial of service in ICM
Note 1981955 - Enforcing minimal request transfer rates in ICM
Updated by Note 2179384 - Traffic control: Wrong request transfer rate calculation
Apply the kernel patch level specified in this SAP Note and configure the ICM in accordance with SAP Note 1981955.
Alternatively, you can also use an upstream SAP Web Dispatcher with a corresponding configuration to protect the system.
SAP Web Dispatcher and ICM offer the same mechanism to enforce a minimum request data rate to prevent flooding the
server with tons of low data rate requests (DoS). All connections that do not satisfy the required rate are closed.
→ If you use it, check the ICM security log and the dev trace
“This mechanism replaces the previous one configured by parameter icm/traffic_control “ which offers a timeout only.
© 2022
2015-04 SAP SE. All rights reserved. 1582
March 2015
Topics March 2015
Note 2110020 - Enabling TLS or disabling SSLv3 protocol versions on SAP WebDispatcher, or SAP
WebAS (AS ABAP 6xx, 7xx or AS Java >= 710)
Note 1944155 - Missing authority check in Report RKEDELE1
Note 1970644 - SAL: Missing overview of message definitions
Security Configuration Validation using SAP Solution Manager
for: Why you should really get rid of old password hashes *NOW*
© 2022
2015-03 SAP SE. All rights reserved. 1584
Note 2110020 - Enabling TLS or disabling SSLv3 protocol versions
on SAP WebDispatcher, or SAP WebAS
The motivation to disable SSLv3 might be to mitigate POODLE attacks (CVE-2014-3566) against Web
Browsers.
The motivation to get TLSv1.0 support may be newly occurring interop problems with communication
peers that have recently disabled/removed support for SSLv3 (e.g. the Web Browsers Mozilla Firefox
35 and Google Chrome 40), or Servers where SSLv3 was disabled to mitigate POODLE attacks.
This note 2110020 is a how-to guide about…
• how to determine the Netweaver component version of your sapwebdisp or icman
• how to determine the version of your SAPCRYPTOLIB
• where to get software updates for SAPCRYPTOLIB 5.5.5 / CommonCryptoLib 8 and SAP
WebDispatcher (or the entire Kernel including icman)
You can configure the desired SSL&TLS protocol versions through the two SAP profile parameters
ssl/ciphersuites and ssl/client_ciphersuites according to the description and
recommended settings in Section 7 of SAP Note 510007.
© 2022
2015-03 SAP SE. All rights reserved. 1585
Note 1944155 - Missing authority check in Report RKEDELE1
© 2022
2015-03 SAP SE. All rights reserved. 1586
Note 1970644 - SAL: Missing overview of message definitions
report RSAU_INFO_SYAG
© 2022
2015-03 SAP SE. All rights reserved. 1587
Tips about the Security Audit Log
http://scn.sap.com/docs/DOC-60743
Using note 1970644 you can get report RSAU_INFO_SYAG which shows all events of the Security
Audit Log including the current status of activation. The detail view allows you to create an HTML-
based event definition print list including the full documentation.
Activate all critical events. Activate other events to support various security improvement projects:
Topic Description and references Messages Project
BACK RFC callback (note 2128095) DUI DUJ CUK Secure RFC Callback
FILE Directory Traversal (note 1497003) CUQ CUR CUS CUT DU5 Secure File access
REPORT Report start AUW AUX Avoid SA38 by using custom report transactions
Generic table access via RFC using functions Secure standard table access (authorization
RFC-TABLE CUZ
like RFC_READ_TABLE (note 1539105) object S_TABU_RFC)
Switchable authorization scenarios, transaction
SACF DUO DUP DUQ DUU DUV Secure RFC functions
SACF (note 2078596)
FTP server allowlist using table SAPFTP_SERVERS DU1 DU2 DU3 DU4 DU5
SAP FTP Secure SAP FTP
(note 1605054) DU6 DU7 DU8
Generic table access using transactions like SE16, Secure standard table access (authorization
SE16 DU9
SE16N, SM30, SM31, SM34, or SQV (note 2041892) object S_TABU_DIS, S_TABU_NAM)
© 2022
2015-03 SAP SE. All rights reserved. 1588
Security Configuration Validation using SAP Solution Manager
for: Why you should really get rid of old password hashes *NOW*
© 2022
2015-03 SAP SE. All rights reserved. 1589
Security Configuration Validation using SAP Solution Manager
for: Why you should really get rid of old password hashes *NOW*
© 2022
2015-03 SAP SE. All rights reserved. 1590
How to find Configuration Stores and Documentation?
➢ Transaction CCDB
© 2022
2015-03 SAP SE. All rights reserved. 1591
How to find Configuration Stores and Documentation?
© 2022
2015-03 SAP SE. All rights reserved. 1592
February 2015
Topics February 2015
Note 2128095 - SAL Missing parameters in DUI, DUJ, and DUK messages
Note 2015232 - Missing authorization check in XX-PART-OPT-INV (from September 2014)
Note 1902611 - Potential information disclosure relating to BC-SEC (from November 2013)
Note 2074736 - Directory traversal in GW (from November 2014)
© 2022
2015-02 SAP SE. All rights reserved. 1594
Note 1686632 - Positive lists for RFC callback (extended)
Questions from users
➢ Is it possible to use wildcards in allowlists?
• By using '*' in the allowlist table RFCCBWHITELIST for field CALLED_FM or CALLED_BACK_FM, you can
allow all called/callback function modules for the specified system. (see documentation of release 7.40)
➢ Does SAP plans to deliver a standard allowlist for SAP standard functions / remote scenarios?
Not really as we do not know your destination names and your active scenarios
Transaction SM59 gets an options to generate the allowlist using the Security Audit Log
System Recommendations shows the note for all systems because it‘s classified as a release
independent (= product independent) note, which has no “Support Package assignment”, no
“Automatic Correction Instruction”, no “Manual Activity”
The Application Component XX-PART-OPT-INV „SAP Invoice Management by Open Text“ belongs to
software component OTEXTVIM which is an Add-On to SAP ERP 6.0.
See:
Note 1721041 - SAP Invoice Management by OpenText support for EhP6
Note 1598141 - SAP Enhancement Package 6 for SAP ERP 6.0:Compatible Add-ons
© 2022
2015-02 SAP SE. All rights reserved. 1596
Note 2015232 - Missing authorization check in XX-PART-OPT-INV
© 2022
2015-02 SAP SE. All rights reserved. 1597
Note 1902611 - Potential information disclosure relating to BC-SEC
The Secure Storage (ABAP) is based on a static main key by default. You can set an individual
main key by yourself.
Report by ERPScan:
http://erpscan.com/press-center/blog/sap-passwords-part-1/
Online Help:
Secure Storage in the File System (AS ABAP)
Using an Individual Encryption Key
Activities:
• Check recommended setting of Profile parameter rsec/securestorage/keyfile
• Set individual main key using transaction SECSTORE (see notes 1902258 and 1922423)
➢ Set „Display/maintenance using standard tools like SE16 not allowed“ and
➢ assign special table authorization group SPSE for tables RSECTAB and RSECACTB
➢ No user should have authorizations for S_TABU_DIS for table authorization group SPSE
© 2022
2015-02 SAP SE. All rights reserved. 1598
Note 1902611 - Potential information disclosure relating to BC-SEC
…
© 2022
2015-02 SAP SE. All rights reserved. 1599
Note 1902611 - Potential information disclosure relating to BC-SEC
© 2022
2015-02 SAP SE. All rights reserved. 1600
Note 2074736 - Directory traversal in GW
Transaction SMGW and profile parameter gw/logging now restrict allowed pathnames to specific
directories.
Solution:
1. Check value of profile parameter gw/logging
If logging is off, you will observe, that the default is secure (no action; no path defined in
LOGFILE):
ACTION= LOGFILE=gw_log-%y-%m-%d SWITCHTF=day MAXSIZEKB=100
→ You can shift any activity to the next planned maintenance window.
2. Upgrade Kernel as described in note 2074736 and 2035100 (this note lists higher patch levels)
SAP KERNEL 7.20 patch 712
SAP KERNEL 7.21 patch 332
SAP KERNEL 7.40 patch 76
SAP KERNEL 7.41 patch 113
SAP KERNEL 7.42 patch 34
3. Set profile parameter gw/logging_secure = 1 as described in the note 2035100
© 2022
2015-02 SAP SE. All rights reserved. 1601
January 2015
Topics January 2015
Repetition: Why you should really get rid of old password hashes *NOW*
Posted by joris van de Vis in SCN Security on May 8, 2014 9:01:30 AM
How many notes are in scope of the monthly patch process?
How to find security related notes about databases (Example: Oracle)?
Note 2094598 - Fixing POODLE SSLv3.0 Vulnerability in AS Java 7.00, 7.01, 7.02
Note 1985387 - Potential information disclosure relating to SAP Solution Manager
© 2022
2015-01 SAP SE. All rights reserved. 1603
Why you should really get rid of old password hashes *NOW*
Posted by joris van de Vis in SCN Security on May 8, 2014 9:01:30 AM
Notes 991968 / 2076925 - List of values for "login/password_hash_algorithm“ (SHA-1, SHA-256, SHA-384, SHA-512)
Note 1023437 - ABAP syst: Downwardly incompatible passwords (since NW2004s)
Note 1237762 - ABAP systems: Protection against password hash attacks
Note 1300104 - CUA|new password hash procedures: Background information
Note 1458262 - ABAP: recommended settings for password hash algorithms
Note 1484692 - Protect read access to password hash value tables
Steps:
• Monitor current configuration e.g. using application Configuration Validation
• Protect tables containing password hashes: restrict S_TABU_DIS / S_TABU_NAM
(if you want to give access to a part of a table you can create a new database view)
• Check compatibility i.e. concerning a CUA supporting very old systems with old releases, too
• Set profile parameters to enforce new policy
• Delete old password hashes
© 2022
2015-01 SAP SE. All rights reserved. 1604
Password hashes in SAP NetWeaver ABAP
© 2022
2015-01 SAP SE. All rights reserved. 1605
What is a password hash?
But password hashes can be generated from potential passwords until password hashes match
Password: Hash:
Welcome 83218ac34c1834c26781fe4bde918ee4
Thisisastrongpassword 9d6fffda73e361025b92fb702aabf5e0
© 2022
2015-01 SAP SE. All rights reserved. 1607
Which password hash is compared during user login?
User1, …
stored password hash
Old Pwd Hash PASSCODE
3 Successful user login
if password hash is Current Pwd Hash PWDSALTEDHASH
matching
© 2022
2015-01 SAP SE. All rights reserved. 1608
Let’s hack an SAP system by weak password hashes!
Attack scenario
Logon to an SAP system with a user having table display access to USR02
Username
SAP NetWeaver Password
Password Application Server ABAP Cracker
© 2022
2015-01 SAP SE. All rights reserved. 1609
Let’s hack an SAP system by weak password hashes!
Attack scenario
Logon to an SAP system with a user having table display access to USR02
Username
SAP NetWeaver Password
Password Application Server ABAP Cracker
© 2022
2015-01 SAP SE. All rights reserved. 1610
What happens during user creation?
Table USR02
Very Old Pwd Hash BCODE (≤ 6.40)
© 2022
2015-01 SAP SE. All rights reserved. 1611
Some important details about available AS ABAP password hashes!
Hash Algorithm /
Password Hash Release Code Version Security Status
BCODE 3.1i MD5 based Broken, full brute force is possible by an open source password cracker with
(Code Version A-E) GPU acceleration within max 20 hours
PASSCODE 7.00-7.01 SHA1 based Limited, duration of attack depends on password length and password
(Code Version F) complexity
PWDSALTEDHASH 7.02 Iterated salted SHA-1 State of the art, higher number of iterations slows down the hash calculation;
(Code Version H) usage of random salts prevents hash pre-calculation; password length and
complexity mitigate dictionary attacks
© 2022
2015-01 SAP SE. All rights reserved. 1612
What are the issues around password hashes in SAP systems?
SAP systems store passwords also with a broken password hash algorithm
Refer to SAP notes 1237762 and 1458262
Password hashes are stored in several tables and tables are not assigned to special table
authorization groups
Depending on the SAP release, password hashes are stored in up to 6 tables / views
By default, password hash tables are assigned to table authorization group SC (which contains many tables)
Refer to SAP note 1484692
Refer to SAP note 2024431 that provides a report to adjust TDDAT in customer landscapes
© 2022
2015-01 SAP SE. All rights reserved. 1613
What are the issues around password hashes in SAP systems?
Large number of users have display access to the password hash tables
Depending on the authorization concept, usually several hundred to several thousand users have access to
password hash tables
Analysis can be done with SUIM
Authorization Object S_TABU_DIS
Activity 03 (Display)
- Table Auth Group SC, SPWD
- Table Auth Group #*
© 2022
2015-01 SAP SE. All rights reserved. 1614
SAP Runs SAP:
Approach for password hash protection
Activate that only new password hashes for users are created
Check that the CUA system generates all three password hashes
Change profile parameter on all systems - login/password_downwards_compatibility = 0
Exclude the CUA system if this system is connected to systems not supporting PWDSALTEDHASH
© 2022
2015-01 SAP SE. All rights reserved. 1615
SAP Runs SAP:
Approach for password hash protection
Re-enforce / adjust password policies
Passwords for all single-sign on users have been removed
Change all technical users to user type SYSTEM to exclude from password policy
Password policy was adjusted by updating profile parameters (e.g. login/min_password_lng)
Password policy was enforced by setting profile parameters
(login/password_compliance_to_current_policy)
Current Pwd Hash PWDSALTEDHASH (≥ 7.02) Current Pwd Hash PWDSALTEDHASH (≥ 7.02)
© 2022
2015-01 SAP SE. All rights reserved. 1616
SAP Runs SAP:
Internal implementation of password hash protection
© 2022
2015-01 SAP SE. All rights reserved. 1618
SAP Runs SAP:
Monitoring of ABAP password hash generation
© 2022
2015-01 SAP SE. All rights reserved. 1619
SAP Runs SAP:
Monitoring of ABAP password hash access
© 2022
2015-01 SAP SE. All rights reserved. 1620
How many notes are in scope of the monthly patch process?
Application Release
January 2015 Note
Component
Short text Priority
date
Type
1985387 SV-SMG-INS-AGT Potential information disclosure relating to SAP Solution Manager high 13.01.2015 SecNote
2000401 IS-A-DP Missing authorization check in IS-A-DP high 13.01.2015 SecNote
2016638 BC-TWB-TST-ECA Untrusted XML input parsing possible in BC-TWB-TST-ECA high 13.01.2015 SecNote
2065073 BC-CST-LL Missing authorization check in System Trace high 13.01.2015 SecNote
10 Security Notes 2090692 BC-SEC Security vulnerability in ICM content filter [sapcsa] medium 13.01.2015 SecNote
2094598 BC-JAS-SEC-CPG Fixing POODLE SSLv3.0 Vulnerability in AS Java HotNews 13.01.2015 SecNote
on Patch Day 2098906 HAN-AS-XS Code injection vulnerability in SAP HANA XS high 13.01.2015 SecNote
2109565 HAN-DB Potential information disclosure relating to IMPORT FROM statement high 13.01.2015 SecNote
1 Support Package 2111169 XX-PART-CLK Security Vulnerabilities in ClickSoftware Applications high 13.01.2015 SecNote
2113333 BC-SYB-ASE Multiple SQL injection vulnerabilities in SAP ASE high 13.01.2015 SecNote
Note on Patch Day
1951171 LO-SPM Potentiell kontrollierbarer RFC-Funktionsbaustein bei EWM medium 13.01.2015 SPIN
Conclusion: All notes published after the previous Patch Day are in scope!
© 2022
2015-01 SAP SE. All rights reserved. 1621
How to find security related notes about databases?
Most security related notes about databases (except for HANA and SYBASE) are not “Security Notes”
➢ The notes are not listed on https:/support.sap.com/securitynotes
➢ The notes are not listed by application System Recommendations
Example for Oracle:
➢ Note 1868094 - Overview: Oracle Security SAP Notes (updated on 03.12.2013)
This note lists ~60 security related notes
➢ Note 850306 - Oracle Critical Patch Update Program (updated on 25.11.2014)
This note lists ~30 critical patch notes
Other sources about secure configuration of Oracle databases:
➢ White Paper: Database Security for Oracle (PDF) from 2012
➢ SAP NetWeaver Security Guide - Oracle on Windows
➢ SAP NetWeaver Security Guide - Oracle on UNIX
© 2022
2015-01 SAP SE. All rights reserved. 1622
Note 2094598 - Fixing POODLE SSLv3.0 Vulnerability in AS Java
7.00, 7.01, 7.02
The solution is available as a patch even for quite old support packages.
The manual activity of the note is not required (as the old protocol SSL 3.0 is switched off automatically
by applying the fix.
Note 2092630 describes how to disable SSLv3 on AS ABAP, on AS JAVA as of 7.1, and on HANA.
There does not exist a solution for AS JAVA release 6.40.
© 2022
2015-01 SAP SE. All rights reserved. 1623
Note 1985387 - Potential information disclosure relating to SAP
Solution Manager
Open questions:
o How to check if a Solution Manager system is affected?
o Don’t care about deep analysis, just do it.
o How to change the password of the users?
o Not using transaction SU01 but in SolMan “System Preparation” / “Maintain Users”
o Is it necessary to tell Diagnostics Agents about the new password?
o Only in case of “Basic Authentication” but in this case you should go for “Certificate Based Authentication” anyway
o If yes, how to tell the Diagnostics Agents about the new password?
o That’s somewhere in the Agent Admin user interface
o Which folder contains the temporary files?
o C:\Program Files\sapinst_instdir on windows respective /tmp/sapinst_instdir on Unix/Linux but log files can
also be written to other directories, if non-standard installation procedures had been executed.
➢ These questions triggered the creation of new note 2119627 Change the Password for the
Diagnostics Agent Connection User in SAP Solution Manager
© 2022
2015-01 SAP SE. All rights reserved. 1624
December 2014
Topics December 2014
© 2022
2014-12 SAP SE. All rights reserved. 1627
Recent notes for application System Recommendations
2099728 SysRec: Object list for ABAP notes does not show Usage Procedure Logging data (UPL)
from 02.12.2014 for SolMan 7.1 SP 9 - 12
2025144 SysRec: enhancement for RFC to managed system and switch framework component
from 14.10.2014 for SolMan 7.1 SP 6 – 12
© 2022
2014-12 SAP SE. All rights reserved. 1628
Note 1987344 - Code injection vulnerability in the OCS functionality
© 2022
2014-12 SAP SE. All rights reserved. 1629
Note 2039348 - Missing whitelist check in GRC-ACP
Questions from users
➢ Can I use authorizations for S_RFC or security control using UCON instead?
▪ GRC applications come with several RFC enables functions. This is true for a central GRC box as well as for the GRC
plugins for managed systems. Therefore you should have a strong authorization concept for authorization object S_RFC
and/or remote security based on UCON.
▪ S_RFC respective UCON secure who is able to execute which RFC enabled functions. This includes RFC functions from
GRC. The allowlist as described in note 2039348 secures which other functions can be indirectly called via the RFC
interface of GRC.
© 2022
2014-12 SAP SE. All rights reserved. 1630
Note 2046493 - Privilege escalation vulnerability in saposcol
System Recommendations cannot exactly check if the system in vulnerable, therefore it shows the
note for all systems. However, only Unix systems are affected (even if saposcol exists for other
platform as well).
Verify that the s-bit is not set. You can use report RSBDCOS0 for to execute following command:
ls -l /usr/sap/hostctrl/exe/saposcol
Start saposcol either as a root (not recommended according to note 726094), or use
SAPHOSTAGENT package which contains the new saposcol and handles it's starting/stopping
automatically in a safe way (see Note 1031096 - Installing Package SAPHOSTAGENT)
Other references:
Note 19227 - Open newest saposcol
Installation and Configuration of saposcol
http://help.sap.com/saphelp_nw70ehp2/helpdata/en/aa/b8c93a8aaa2b28e10000000a114084/content.htm
© 2022
2014-12 SAP SE. All rights reserved. 1631
Note 2091973 - Missing authorization check in FS-CD
© 2022
2014-12 SAP SE. All rights reserved. 1632
Note 1686632 - Positive lists for RFC callback (extended)
Questions from users
➢ Is it possible to use wildcards in allowlists?
• By using '*' in the allowlist table RFCCBWHITELIST for field CALLED_FM or CALLED_BACK_FM, you can
allow all called/callback function modules for the specified system. (see documentation of release 7.40)
➢ Does SAP plans to deliver a standard allowlist for SAP standard functions / remote scenarios?
Not really as we do not know your destination names and your active scenarios
Transaction SM59 gets an options to generate the allowlist using the Security Audit Log
© 2022
2014-12 SAP SE. All rights reserved. 1634
Note 1686632 - Positive lists for RFC callback (extended)
System landscape
SAP landscape A
!
Development Production
system
! Test system ! system
! !
SAP landscape B
Development ! Production
Test system !
system system
Keep in mind that both system types, ABAP and Java, contain a message server and are therefore
affected.
It is sufficient to update the message server. You can use the message server from 7.20 for a system
with a kernel running on 7.00, 7.01, 7.10, or 7.11, however, although this will work from a technical
point of view it is not officially supported by SAP. SAP strongly recommend to upgrade the kernel to
release 7.20 at least. Note 1636252 describes how to install the downward-compatible kernel.
see blog:
Best-practice about Security Advisory concerning Kernel related notes 1785761 and 1800603
© 2022
2014-12 SAP SE. All rights reserved. 1636
November 2014
Topics November 2014
© 2022
2014-11 SAP SE. All rights reserved. 1638
Note 1738988 - Code-Injection-Vulnerability in ABAP DDIC Utility
See also:
Note 1872638 - Code injection vulnerability in CRM-MKT-MPL-TPM-PPG (October 2014)
Note 1835691 - Code injection vulnerability in CRM-MKT-MPL-TPM-PPG (September 2014)
© 2022
2014-11 SAP SE. All rights reserved. 1639
Note 2078596 - SACF: Switchable Authorization (RFC) Scenarios
Issue: RFC enabled function modules which do not perform any or sufficient SAP_BASIS
business related authorization checks. 700 SP 32
701 SP 17
Note Component Description 702 SP 17
710 SP 19
2078596 BC-MID-RFC Further improvements for RFC security
711 SP 14
2008727 BC-MID-RFC Whitepaper: Securing Remote Function Calls 720 SP 8
730 SP 13
<many> <many> Switchable authorization checks for RFC in <…> 731 SP 14
740 SP 9
Process:
1. Fulfil prerequisites for SAP_BASIS and Kernel
2. Enable RFC scenarios for logging using transaction SACF
3. After some time: Adjust authorizations and then activate RFC scenarios
Mitigation: Implement a strong authorization concept about S_RFC or use UCON mainly to block all
unused RFC scenarios.
How to get RFC call traces to build authorizations for S_RFC for free!
http://scn.sap.com/community/security/blog/2010/12/05/how-to-get-rfc-call-traces-to-build-authorizations-for-srfc-for-free
Unified Connectivity (UCON)
http://scn.sap.com/docs/DOC-53844
© 2022
2014-11 SAP SE. All rights reserved. 1641
Note 2078596 - Further improvements for RFC security
Caution: Other notes about “Missing authorization check in …“ might not be related to Switchable
Authorization Scenarios!
Note 2078596 currently lists 32 notes which are related to an SACF project and 28 notes describing
other solutions like
• Introduction of an authorizations check which does not require to update authorizations
• Deactivation of obsolete but critical functions
• Disable the feature that the function can be called remotely
© 2022
2014-11 SAP SE. All rights reserved. 1642
Note 2008727 - Whitepaper: Securing Remote Function Calls (RFC)
The White Paper shows best-practice to solve typical https://support.sap.com/securitywp
questions: Contents:
• How to secure RFC/http destinations between different Securing RFC Destination Configuration
system types (DEV, TEST, PRD)? Trusted System Security
Secure Network Communication
• How to secure RFC/http destinations having stored
credentials (userid / password)? Securing RFC Communication on the Server
Limiting Access to RFC Function Modules
• How to secure RFC/http destinations using trust Authorization Maintenance for RFC Communication
relationships (Trusted RFC, SAP Authentication Activating Switchable Authorization Checks
Token)?
Securing RFC Communication on the Client
• How to encrypt RFC/http communication channels?
Securing RFC Callback
• How to secure RFC server programs?
Securing the RFC Gateway
• How to secure the RFC client system? Access Control for External RFC Servers
Access Control for RFC Proxy Requests
• How to setup an authorization concept for RFC?
Blocking RFC Communication
• How to analyze RFC usage? RFC Security Monitoring
© 2022
2014-11 SAP SE. All rights reserved. 1643
Note 2086818 - Fixing POODLE SSLv3.0 (CVE-2014-3566)
A fundamental flaw has been determined in the older cryptography protocol Secure Sockets Layer 3.0
(SSL 3.0), used to encrypt HTTPS communication. An exploit, called Padding Oracle On Downgraded
Legacy Encryption (POODLE), has been published September 2014, that takes advantage of this
vulnerability (CVE-2014-3566).
Although the SSL 3.0 protocol has been superseded with the newer Transport Layer Security (TLS)
cryptography protocol, most web browsers also implement support for a "downgrade" protocol that
allow SSL to be used if a connection using TLS cannot be established with a web application server.
This issue is not specific to SAP products, but affects all web applications that use HTTPS/SSL
encrypted communication channels.
Solution:
Ensure that all web browsers and all web application servers disable use of the SSL 3.0.
Clients: Refer to vendor specific documentation for your web browser
Servers: Refer to vendor specific documentation for your Web Application Server
© 2022
2014-11 SAP SE. All rights reserved. 1644
Note 2086818 - Fixing POODLE SSLv3.0 (CVE-2014-3566)
Note Component Description
2086818 BC-SEC-SSL Fixing POODLE SSLv3.0 (CVE-2014-3566) Vulnerability (Central note)
2092630 BC-SEC-SSL Turning off SSLv3 on AS ABAP, on AS JAVA as of 7.1, and on HANA
2094598 BC-JAS-SEC-CPG Fixing POODLE SSLv3.0 Vulnerability in AS Java 7.00, 7.01, 7.02 (January 2015)
2088755 BC-JAS-SEC-CPG Disabling SSLv3.0 in Netweaver AS Java 6.40 not possible
510007 BC-SEC-SSL Setting up SSL on Web Application Server ABAP
2089135 SBO-BC Upgrade OpenSSL to resolve the POODLE issue with the SSL 3.0
2083444 BI-BIP-DEP Impact of the POODLE vulnerability on SAP BusinessObjects software
2096275 BC-SYB-SQA Fixing Poodle SSLv3.0 Vulnerability in multiple SAP Sybase products
2094995 MOB-AFA Afaria Server Poodle Mitigation
2105793 MOB-SYC-SAP Fixing Poodle SSLv3 vulnerability for Agentry
2107562 MOB-MCO-MM Fixing Poodle SSLv3 vulnerability in Money Mobiliser Platform
2085867 XX-SER-SAPSMP-ACC No more support for old SSL Protocols in Service Marketplace
© 2022
2014-11 SAP SE. All rights reserved. 1645
Note 1686632 - Positive lists for RFC callback (updated)
© 2022
2014-11 SAP SE. All rights reserved. 1646
October 2014
Topics October 2014
© 2022
2014-10 SAP SE. All rights reserved. 1648
Note 2067859 - Potential Exposure to Digital Signature Spoofing
RFC callback can pose risks to business critical systems when initiating RFC communication to other
systems using highly privileged users. In many cases batch jobs are executed by highly privileged
system users. These batch jobs could perform RFC communication to remote systems.
Malicious remote systems could misuse the high privileges of the batch user using RFC callback. The
following access control should therefore be implemented for all business critical systems.
System A System B
RFC callback always performs S_RFC …
CALL FUNCTION ‘B’
authorization checks and potentially additional DESTINATION ‘B’
S_RFC FUNCTION B.
… …
functional authorization checks on the user that
initiated the RFC communication. FUNCTION A S_RFC CALL FUNCTION ‘A’
… DESTINATION ‘BACK’
The authorization management for users ENDFUNCTION
RFC calls.
© 2022
2014-10 SAP SE. All rights reserved. 1650
Note 1872638 - Code injection vulnerability in CRM-MKT-MPL-TPM-PPG
© 2022
2014-10 SAP SE. All rights reserved. 1651
SAP Usage and Procedure Logging (UPL)
Introduction
UPL is a new functionality available in any ABAP based system based on the core functionality of SAP
Coverage Analyzer.
It will be used to log all called and executed ABAP units like programs, function modules down to
classes, methods and subroutines.
Benefits:
✓ No performance impact
✓ 100% coverage of usage
✓ Detection of dynamically called ABAP elements
✓ Secured access to UPL data to protect information
✓ The full reporting capabilities with enriched information in BW of the Solution Manager will give you the
flexibility to analyze ABAP usage on your demands.
UPL, a prerequisite for several new SAP Solution Manager applications like BPCA and EHP Scope & Effort
Analyzer
© 2022
2014-10 SAP SE. All rights reserved. 1652
Usage and Procedure Logging (UPL)
The new way getting the real system usage
▪ UPL is a kernel based logging technology providing runtime usage
information of ABAP procedure units like methods, function modules, Execute
subroutines and much more… business 1
transaction
End User
▪ UPL complements the standard ST03N workload statistics of ABAP
executables
© 2022
2014-10 SAP SE. All rights reserved. 1653
SAP Usage and Procedure Logging (UPL)
FAQ about UPL
How to find out if UPL collection is collecting data?
Start transaction SCOV in the managed system. If UPL is activated, you will see a status information "SCOV lite is activated!"
Furthermore the traffic light under "Data collection" should be green. In this case everything is fine.
Will UPL have any impact on the system performance?
No, there is no measurable impact, because we count the usage as soon as the ABAP compiler is loading the code. This is
confirmed by the SAP benchmark team.
Are there any risks to activate UPL?
No, there is no known risk to activate UPL.
How much data will be consumed in the managed system?
We collect usage data on a daily basis. As soon as one ABAP program was executed, we increase only the execution
counter. From our experience the needed DB space is between 2-10 MB for 14 days of data. But this depends on the real
usage of different programs.
There is an error message "Data collection was not performed" in monitor of SCOV.
Ensure settings and server are correct. If not please use report /SDF/UPL_CONTROL to stop UPL mode. Start transaction
SCOV and correct the server settings. Then reactivate the UPL again.
In case of technical issues open a customer message on component SV-SMG-CCM-CDM
© 2022
2014-10 SAP SE. All rights reserved. 1654
SAP Usage and Procedure Logging (UPL)
Usage Analysis (local in managed system)
© 2022
2014-10 SAP SE. All rights reserved. 1655
SAP Usage and Procedure Logging (UPL)
Usage Analysis (local in managed system)
© 2022
2014-10 SAP SE. All rights reserved. 1656
Extended Functions in System Recommendations
Show object list for selected ABAP notes
© 2022
2014-10 SAP SE. All rights reserved. 1657
Analysis of Object Usage in System Recommendations
Data Collection of Usage Procedure Logging (UPL)
System Recommendations
SAP CRM
DEV
TST UPL
1200
PRD 80
0
0
0
30
0
© 2022
2014-10 SAP SE. All rights reserved. 1658
Analysis of Object Usage in System Recommendations
Show object list for selected ABAP notes with usage data
© 2022
2014-10 SAP SE. All rights reserved. 1659
Cross-System check for System Recommendations
Report ZSYSREC_NOTELIST with object list and usage data
© 2022
2014-10 SAP SE. All rights reserved. 1660
SAP Usage and Procedure Logging (UPL)
Prerequisites for the monitored system
▪ SAP NetWeaver SAP_BASIS 7.01 SP10 or 7.02 SP9 (= SAP ERP 6.0 EHP4 or SAP ERP 6.0 EHP5)
▪ ST-PI 2008_1_700 SP4 or SP5 & Note 1683134 or ST-PI 2008_1_700 SP6 or higher
▪ Kernel 720 Patch 94 or higher according to …
▪ SAP Note 1785251 - SCOV/UPL: Error messages in monitor (Kernel 720 Patch 410 / 721 Patch 112)
▪ SAP Note 1822227 (to allow changing the data retention time using report /SDF/UPL_CONTROL )
▪ SAP Note 1906451 - Technical Preparation for Custom Code Management
▪ Based on our experience the space requirements are 2-10 MB for 14 days of data. So even data collection of
one year won´t massively affect space requirements. Nevertheless verify your individual storage settings /
database free space for a higher retention time value.
▪ Report /SDF/UPL_CONTROL shows the status:
© 2022
2014-10 SAP SE. All rights reserved. 1661
SAP Usage and Procedure Logging (UPL)
Activation via SAP Solution Manager
The UPL activation procedure was subject of continuous enhancements in the SAP Solution Manager
infrastructure. Starting with many manual steps in SAP Solution Manager 7.1 SP5 it has finally
reached a fully guided and system supported version in SAP Solution Manager 7.1 SP 11.
The SOLMAN_SETUP scenario for Custom Code Management contains all necessary steps and UIs
to handle UPL configuration end to end including job scheduling of related UPL jobs.
See
Note 1955847 - UPL: Activation Procedure and Authorization Handling in SAP Solution Manager
Additional authorizations:
• S_COV_ADM with change activity
• S_RFC for function group /SDF/SCOV_LITE
© 2022
2014-10 SAP SE. All rights reserved. 1662
SAP Usage and Procedure Logging (UPL)
Guided Procedure as of SAP Solution Manager 7.1 SP 11
© 2022
2014-10 SAP SE. All rights reserved. 1663
SAP Usage and Procedure Logging (UPL)
Central Analysis using BW in SAP Solution Manager
BW Query 0SM_CCL_UPL_MONTH
© 2022
2014-10 SAP SE. All rights reserved. 1664
Analysis of Object Usage in System Recommendations
Troubleshooting
If you do not see the additional column in System Recommendations or if you get zero results only:
➢ If UPL is not working ask for advice via application component SV-SMG-CCM
➢ If SysRec does not show existing usage data, create a ticket on application component SV-SMG-SR
➢ If report ZSYSREC_NOTELIST does not show existing usage data, send me a mail or comment on
http://scn.sap.com/community/security/blog/2011/07/18/report-zsysrecnotelist--show-results-of-system-recommendation
© 2022
2014-10 SAP SE. All rights reserved. 1665
September 2014
Topics September 2014
© 2022
2014-09 SAP SE. All rights reserved. 1667
Note 1909442 - Incorrect authorization check in IAC post processing
Workaround: Use the "download basket" of the SMP do download notes to your PC. Then unzip the
dowloaded archive and upload the files to SNOTE.
Works fine!
© 2022
2014-09 SAP SE. All rights reserved. 1668
Note 1971397 - Missing authorization check in BW-BEX-OT
© 2022
2014-09 SAP SE. All rights reserved. 1669
August 2014
Topics August 2014
Note 2020395 - Sapinst used static salt for password encryption on UNIX / Linux
Note 1917381 - Missing authorization check in Profile Maintenance
Note 1769064 - Additional values for auth/rfc_authority_check
© 2022
2014-08 SAP SE. All rights reserved. 1671
Note 2020395 - Sapinst used static salt for password encryption on
UNIX / Linux
Only relevant for UNIX / Linux servers (but not for Windows…) on which you have installed ABAP,
Java, etc. in the past using SAPinst patch before 2013.12.
Check file /etc/shadow for users showing the substring R3 surrounded by ‚$‘ which is the field
seperator within this file. These users have the weak salt as described in the note.
The note proposes to re-set the existining value of the password to get a new random salt for the hash.
Caution: Be very careful to re-set the existining value – you should be sure that you know the existing
password. If you change the password to a different value than you have to update it wherever it is
used, too.
© 2022
2014-08 SAP SE. All rights reserved. 1672
Note 1917381 - Missing authorization check in Profile Maintenance
Several customers had been waiting for the publication of this note. Now the note is available again.
Remark for customers that have installed Support Package 5 of SAP_BASIS 740 (SAPKB74005):
Version 2 of this note cannot be implemented if version 1 is already implemented. Do not try to de-
implement version 1 in this case.
© 2022
2014-08 SAP SE. All rights reserved. 1673
Note 1769064 - Additional values for auth/rfc_authority_check
Calling RFC function modules requires a valid authentication of the user and authorizations for
authorization object S_RFC for all function except the RFC enabled function of function group SRFC.
Some of the RFC functions of this function group unveil system information which might help potential
attackers. Using the new Kernel as described in note 1769064 you can force authentication and
authorization checks for these RFC functions as well.
Be careful to use these options, as this might have a strong impact to existing interfaces!
New options:
3 = Logon required for all function modules except RFC_PING and RFC_SYSTEM_INFO (no authorization check)
4 = Authorization check required for all function modules except RFC_PING and RFC_SYSTEM_INFO
5 = Logon required for all function modules except RFC_PING (no authorization check)
6 = Authorization check required for all function modules except RFC_PING
8 = Logon required for all function modules no authorization check)
It’s much more important to get rid of any ‘*’ in authorizations for S_RFC!
Run a project to improve authorizations for S_RFC, e.g. using this blog on SCN:
How to get RFC call traces to build authorizations for S_RFC for free!
http://scn.sap.com/community/security/blog/2010/12/05/how-to-get-rfc-call-traces-to-build-authorizations-for-srfc-for-free
© 2022
2014-08 SAP SE. All rights reserved. 1674
Tips & Tricks:
Notes showing several SP for same release
Example: Note 1674132 - Code injection vulnerability in BC-SRV-COM-FTP
There are multiple entries for different support package per release. In addition there
are multiple correction instructions per release.
Which SP per release is required to get the complete solution?
➢ You need the latest SP.
Is the system safe if you are in beetween?
➢ If you just have the lower SP, the system is not safe. Individual analysis would be
required to judge if you don‘t get anything ar or partly solution.
Do I need to take care while implementing a note using the note assistant, transaction
SNOTE?
➢ Usually you see several correction instructions. One is valid up to lower SP – 1, the
other is (should be) valid up to higher SP – 1. SNOTE takes care automatically
implementing all relevant correction instructions in the correct order.
© 2022
2014-08 SAP SE. All rights reserved. 1675
Tips & Tricks:
Notes referring to other notes at Causes - Side Effects
Example: Note 1674132 contains a reference to an update note
1826162 in the section ‚The following SAP Notes correct this Note /
Patch‘
This is a similar case as described on previous slide which shows that
the correction provided by the first note either is incomplete or even is
the source of errors.
If the update note contains correction instructions that it‘s usually
sufficent just to implement the update note. The note assistant,
transaction SNOTE, will read the first note and will implement these
correction instructions first. However, there is no harm if you start
implementing the first note. Take care to get the update note, too.
System Recommendations shows both notes if the notes are relevant.
© 2022
2014-08 SAP SE. All rights reserved. 1676
Tips & Tricks: old notes
Examples for notes showing up in SysRec for many systems
Note Short Text Auto Manual Date Application Software Comment
Number Component Component
0001497599 Missing authorization check in X 14.12.2010 AP-MD-PRO SAP_ABA An automatic correction instruction is valid for All
method Support Package Levels
GET_CONVERTED_TABLE
0001517478 Missing Authorization Check X 14.12.2010 BC-DWB-UTL-BRR SAP_BASIS An automatic correction instruction is valid for All
in Menu Painter Support Package Levels
0001541716 Potential Denial of Service in X 08.03.2011 BC-DOC-TTL SAP_BASIS An automatic correction instruction is not restricted
translation tools funct. by to-SP
0001571325 Potential disclosure of X 10.05.2011 CO-PC SAP_APPL An automatic correction instruction is valid for All
persisted data in test code Support Package Levels
0001599094 HCM: Directory traversal in X 01.07.2011 PT-TL SAP_HRRXX An automatic correction instruction is valid for All
PT-TL Support Package Levels
0001608317 Potential disclosure of X 08.11.2011 CA-GTF-IC-SAF WEBCUIF The note and the correction instructions are valid for
persisted data in SAF several software components (SAP_ABA, CRMUIF,
WEBCUIF). An automatic correction instruction for
WEBCUIF is not restricted by to-SP
0001648395 Unauthorized modification of X 10.04.2012 CA-AUD SAP_ABA An automatic correction instruction for SAP_ABA is
displayed content in CA-AUD not restricted by to-SP
0001760776 Directory traversal in PY-NL- X 12.03.2013 PY-NL SAP_HRCNL A manual post-implementation instruction for
RP, PA-PA-NL and PA-PF-NL SAP_HRCNL is not restricted by to-SP. This is
correct as it describes mandatory customizing
activities which you can do after implementing the
note or installing the SP.
© 2022
2014-08 SAP SE. All rights reserved. 1677
Tips & Tricks: old notes
Overall rule
➢ SysRec shows relevant notes if the meta data of the note (validity of correction instructions, assignments of
support packages / patches) show exact ranges.
After implementing these notes via SNOTE / support package / patch, theses notes will vanish from SysRec.
➢ SysRec shows candidates for relevant notes if the meta data of the note is unspecific (release independent,
support package independent, valid for all support packages, no valid-to limitation)
You have to decide if such notes are relevant for a given system. It might be the case that SNOTE accepts
such notes and can implement them without errors. But it might happen that SNOTE runs into trouble as well.
In this case it’s most likely that the note is not relevant for this system. These notes will stay on SysRec (except
if you implement them via SNOTE).
© 2022
2014-08 SAP SE. All rights reserved. 1678
Tips & Tricks: old notes
Some specific rules
➢ If you just implement the coding part of a note but miss to execute any additional manual activities (from manual instructions
or simply from the text of the note) than the note will vanish from SysRec even if the implementation is not complete. This
could happen for ABAP, Kernel, and all others.
➢ If a note has manual instructions describing customizing, profile parameter changes, etc. then it would be correct if the
validity of the instruction is not limited / valid FOR ALL SP but such notes will not vanish from SysRec (if you do not
implement a coding part via SNOTE).
➢ SysRec takes the status from SNOTE (which will be transported from DEV systems to PROD systems, too)
→ in case of ABAP notes only having manual instructions SysRec does ot know if the note is implemented or not and the
note remains visible in SysRec.
➢ Automatic correction instructions which are valid FOR ALL SP or have no valid-to date are (most likely) wrong as SAP always
delivers software corrections with support packages respective patches. You will observe that this had happened with older
notes more often than with newer notes. SNOTE will claim that the note can be applied but will not find that the corrections
are already there if you run a newer support package. If the code was changed in the meantime by another note or another
change in a support package than it could even happen that SNOTE will show errors.
➢ Manual correction instructions which are valid FOR ALL SP or have no valid-to date are (most likely) correct as such notes
usually describe configuration changes which can be applied after you got the new software. You should add such notes to a
special worklist if you plan to postpone the action to the next maintenance activity about upgrading the SP.
© 2022
2014-08 SAP SE. All rights reserved. 1679
July 2014
Topics July 2014
Small patch days in June (19+3) and July (8+3) mostly for non-ABAP / non-Java
Note 1988956 - Unauthorized modification of displayed content in BSP
Note 1881073 - Unauthorized modification of displayed content in BSP
Note 1971238 - Missing authorization check in BC-CUS-TOL-HMT
Note 2017050 - Update 1 to Security Note 1971238
Note 1808003 is not visible anymore
Note 1967780 - Missing authorization check in BW-WHM-DST
Note 2006974 - Code injection vulnerability in PP-PI-CFB
Note 2026132 - Update 1 to security note 1483548
© 2022
2014-07 SAP SE. All rights reserved. 1681
Small patch days in June (19+3) and July (8+3) mostly for non-
ABAP / non-Java
BC-BMT Business Management
System Recommendations shows only notes about BC-BSP Business Server Pages
Software Components which belong to “Technical BC-CUS Customizing
Systems” which are registered in the SLD/SMDL/SolMan. BC-JAS Java Application Server - Please use sub-components
BC-MID Middleware
Use the Service Marketplace BC-SEC Security
BC-SRV Basis Services/Communication Interfaces
https://support.sap.com/securitynotes
BC-SYB Sybase Products
to find Security Notes about other products like Sybase, BC-WD Web Dynpro
BI, Mobile/Afaria. BI-BIP Business intelligence platform
BI-RA Reporting, analysis, and dashboards
BW-WHM Data Warehouse Management
EP-KM Knowledge Management and Collaboration
EPM-BPC Business Planning and Consolidation
FIN-FSCM Financial Supply Chain Management
HAN-LM SAP HANA Lifecycle Management
HAN-WDE SAP HANA Web IDE
MFG-ME SAP Manufacturing Execution
MOB-AFA Afaria
MOB-SUP Sybase Unwired Platform
PP-PI Production Planning for Process Industries
PY-PH Philippines
© 2022
2014-07 SAP SE. All rights reserved. 1682
Small patch days in June (19+3) and July (8+3) mostly for non-
ABAP / non-Java
Transaction LMDB
this data is automatically
delivered by SLD data
suppliers
System
Recommendations
© 2022
2014-07 SAP SE. All rights reserved. 1683
Note 1988956 - Unauthorized modification of displayed content in BSP
Note 1881073 - Unauthorized modification of displayed content in BSP
© 2022
2014-07 SAP SE. All rights reserved. 1684
Note 1971238 - Missing authorization check in BC-CUS-TOL-HMT
Note 2017050 - Update 1 to Security Note 1971238
Note 1971238 from March requires extended authorizations for authorization object S_RFC for
function groups SHI1 and SHI5 in transactions SPRO and SUIM and others.
→do not implement this note without update note 2017050
Note 2017050 from July calls the authorization check only in case of an RFC call.
By the way: do you have a strong authorization concept about authorization object S_RFC?
• No role should contain full authorizations for authorization object S_RFC
• List used functions (FUNC) or at least function groups (FUGR) avoiding *
• Run a project to improve authorizations for S_RFC, e.g. using this blog on SCN:
How to get RFC call traces to build authorizations for S_RFC for free!
http://scn.sap.com/community/security/blog/2010/12/05/how-to-get-rfc-call-traces-to-build-authorizations-for-srfc-for-free
© 2022
2014-07 SAP SE. All rights reserved. 1685
Note 1808003 is not visible anymore
© 2022
2014-07 SAP SE. All rights reserved. 1686
Note 1967780 - Missing authorization check in BW-WHM-DST
Inspecting the ABAP correction instruction we see that’s a development support program which only
will be used in emergency cases:
==== Check authorization to execute this program
AUTHORITY-CHECK OBJECT 'S_DEVELOP' " for user sy-uname
ID 'DEVCLASS' DUMMY
ID 'OBJTYPE' FIELD 'DEBUG'
ID 'OBJNAME' DUMMY
ID 'P_GROUP' DUMMY
ID 'ACTVT' FIELD '03'.
→ Implement the note similar to other notes which deactivate obsolete code: no test required for
production systems.
© 2022
2014-07 SAP SE. All rights reserved. 1687
Note 2006974 - Code injection vulnerability in PP-PI-CFB
What happens if you ignore the manual instruction to create a message via modification?
… not much, the user still get’s the error message code E454(CFB) but without (misleading) text.
© 2022
2014-07 SAP SE. All rights reserved. 1688
Note 2026132 - Update 1 to security note 1483548
The note is shown by System Recommendations if your system runs with SAP_BASIS 701 but
independently from any Support Package.
You do not implement this note via Note Assistant, transaction SNOTE, therefore you do not get rid of
it.
→ Happily ignore this note as you will implement referenced note 1483548 anyway if shown by
System Recommendations
© 2022
2014-07 SAP SE. All rights reserved. 1689
June 2014
Topics June 2014
© 2022
2014-06 SAP SE. All rights reserved. 1691
1808003 - Potential information disclosure relating to BC-CST
→ Do not touch the note (do not implement version 2, do not de-implement version 1)
© 2022
2014-06 SAP SE. All rights reserved. 1692
Minimal authorizations to run System Recommendations
see Security Patch Process FAQ #30
First of all you need access to Work Center "Change Management" (if you don't use the
corresponding WebDynpro application WDC_NOTE_CENTER directly).
To control access to System Recommendations, the authorization object SM_FUNCS in SAP Solution
Manager 7.1 (or SM_TABS in SAP Solution Manager 7.0) can be used to grant or deny access to the
different tabs of System Recommendations.
Use the fields ACTVT=03, SM_APPL=SYSTEM_REC, SM_FUNC=tab (i.e. SECURITY).
You can restrict access to the systems of specific solutions using the authorization object
D_SOL_VSBL with SOLUTION=solution id and ACTVT=03.
Depending on the version of the Solution Manager, authorization object AI_LMDB_PS with ACTVT=03
and LMDB_NAMES=ACTIVE and PS_NAME=system id controls access to individual systems as well.
These authorization objects are the minimal set which you need to execute the WebDynpro application
directly.
See chapter 16.6 "System Recommendations" and 13.14.2 "User Roles for Solutions, Projects, Solution Directory"
in the documentation → Operations → Security Guide SAP Solution Manager 7.1 SP10.
© 2022
2014-06 SAP SE. All rights reserved. 1693
How to run BW reporting on System Recommendations
1. via System Recommendations
© 2022
2014-06 SAP SE. All rights reserved. 1694
How to run BW reporting on System Recommendations
2. via Configuration Validation
Execute BW reporting via Configuration Validation
Start Configuration Validation via same Work Center “Change Management”
Choose tab 'Report Execution → Reporting Templates'
Choose tab 'Configuration reporting'
Optional: Select a system list for comparison (if you have defined one).
Select configuration report 0TPL_0SMD_VCA2_SYS_RECOM_NOTES 'System
recommendation reporting (missing SAP Notes calculated from system recommendations)'
Finally enter selections about systems, area (Security, HotNews, Legal Change,
Performance), notes (as of SolMan 7.1 SP 9) or date ranges
© 2022
2014-06 SAP SE. All rights reserved. 1695
How to send e-mails with results of System Recommendations
via BW Broadcasting (1)
Prerequisites
To send reports by e-mail, you use the standard functions for BW Web Templates, which require only
that your BW system (= Solution Manager) is connected to your e-mail communication. More
information:
SAPconnect (BC-SRV-COM)
http://help.sap.com/saphelp_nw70ehp2/helpdata/en/2b/d925bf4b8a11d1894c0000e8323c4f/frameset.htm
External Sending in the SAP System
http://help.sap.com/saphelp_nw70ehp2/helpdata/en/55/a8b538891b11d2a25a00a0c943858e/frameset.htm
You need note 1880710 “3.X Broadcaster sends empty document” (pilot release) of component
BW-BEX-ET-BC if your SolMan runs with SAP_BW 702 SP 10-14 to be able to enter lower case
selections e.g. for area = „Security“
© 2022
2014-06 SAP SE. All rights reserved. 1696
How to send e-mails with results of System Recommendations
via BW Broadcasting (2)
Configuration
Call the BW report that you want to send by e-mail, and choose the desired settings for the time interval and the systems to be displayed. Create a
Bookmark URL which you later can add to the e-mail text.
Ensure that you call the reports with the user under whose name the e-mails are to be sent. Ensure that this user has a working e-mail address in
his or her user data (transaction SU01).
Right-click any active area of the BW report to display the context menu, switch to the Extended Menu and choose Distribute → By E-Mail.
A new screen now appears, on which you can make settings for the sending of the e-mail. If you have not yet created appropriate settings, choose
Create New Setting. Either create the settings manually or using the wizard.
You can define the title and text of the e-mail here, and to whom it is to be sent:
In the Description input field, enter a meaningful description of the settings.
If you want to send the report directly as part of the e-mail, and it is to be displayed directly in the e-mail, choose the Output Format 'MHTML'.
You can select recipients using their user names in the system or their e-mail addresses. You can also define the recipient list using roles. Separate multiple recipients
with semicolons.
On the Texts tab page, you define the title and text of the e-mail. Note that the e-mails only contain the BW Report itself, that is, they do not contain the selection
elements (report name, time interval, and system ID). Create an e-mail text so that the report can be understood without this information.
If, in addition to viewing the sent BW report, the recipient should be able to directly access the BW report interactively, insert the relevant Bookmark-URL in the contents
of the e-mail.
Leave the data on the General Precalculation and Filter Navigation tab pages unchanged.
© 2022
2014-06 SAP SE. All rights reserved. 1698
How to send e-mails with results of System Recommendations
via BW Broadcasting
© 2022
2014-06 SAP SE. All rights reserved. 1699
How to send e-mails with results of System Recommendations
via BW Broadcasting
Settings
Define description, output format
(MHTML), recipients, and text of
the e-mail (which should contain
the Bookmark URL, too, to allow
interactive access).
Choose either Schedule or
Execute to send the e-mail
© 2022
2014-06 SAP SE. All rights reserved. 1700
How to send e-mails with results of System Recommendations
via BW Broadcasting
Result
E-mail with Result of
the BW report
including a Bookmark
URL to the interactive
BW report
© 2022
2014-06 SAP SE. All rights reserved. 1701
1889999 - Missing authorization check in LCAPPS DP
© 2022
2014-06 SAP SE. All rights reserved. 1702
1966995 - Potential information disclosure relating to WebDynpro Application
1946911 - SAP NWBC ABAP Runtime Patch 35
© 2022
2014-06 SAP SE. All rights reserved. 1703
1896642 - Potential information disclosure relating to Integration
Technology ALE
This note requires manual modifications. Table EDIPOWHITELIST needs to be created using
transaction SE11. Then new messages need to be created using SE91.
After that you can implement the correction using transaction SNOTE.
Let’s assume, you are planning a Support Pack Stack update, which will include this note.
• Do you need to implement the note before the SPS update, following instructions for pre-
implementation work?
• Do you need to perform the pre-implementation steps before applying the SPS?
• If you simply apply the SPS, will table “EDIPOWHITELIST” be delivered empty?
• Should we expect a service disruption if you simply apply the SPS and do not maintain table
“EDIPOWHITELIST”?
© 2022
2014-06 SAP SE. All rights reserved. 1704
1997455 - Potential information disclosure in BC-SEC-USR-ADM
Only customers running a CUA are affected by this vulnerability. Only the CUA main system is
affected.
The solution describes how to improve the authorization concept concerning authorization object
S_RFC for a particular application (Central User Administration, CUA), however, in addition to patch
this application using the note I recommend to have a broader view an RFC authorizations in general:
• No role should contain full authorizations for authorization object S_RFC
• Run a project to improve authorizations for S_RFC, e.g. using this blog on SCN:
How to get RFC call traces to build authorizations for S_RFC for free!
http://scn.sap.com/community/security/blog/2010/12/05/how-to-get-rfc-call-traces-to-build-authorizations-for-srfc-for-free
© 2022
2014-06 SAP SE. All rights reserved. 1705
1881073 - Unauthorized modification of displayed content in BSP
application
Implement the attached correction instruction, check the BAdI documentation and implement the BAdI
to allow the usage of your own reports for the overview form printing.
→ only relevant if you use PP-PI-CFB. In this case testing is strongly recommended.
© 2022
2014-06 SAP SE. All rights reserved. 1707
2028012 - Vulnerability in Afaria mobile device app
Update SAP Afaria on mobile clients to versions 6.60.6417.1 on iOS and 6.60.6417 on Android before
enrollment of new devices.
© 2022
2014-06 SAP SE. All rights reserved. 1708
SAP HANA
2014881 - Potential disclosure of persisted data in SAP HANA Web-based Development Workbench
CVSS Base Score: 3.5 CVSS Base Vector: AV:N/AC:M/AU:S/C:P/I:N/A:N
SAP HANA DATABASE 1.00 SP069 05
© 2022
2014-06 SAP SE. All rights reserved. 1709
BO
1981048 - HTTP Cookies Without HttpOnly Flag Set may lead to Cross Site Scripting Issues
→ BI 4.1 oder Edge 4.1
© 2022
2014-06 SAP SE. All rights reserved. 1710
April 2014
Topics April 2014
© 2022
2014-04 SAP SE. All rights reserved. 1712
OpenSSL Heartbleed Bug
General
The Heartbleed Bug
http://heartbleed.com/
CVE-2014-0160
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160
https://www.cert.fi/en/reports/2014/vulnerability788210.html
How to test servers:
http://www.heise.de/newsticker/meldung/SSL-Gau-So-testen-Sie-Programme-und-Online-Dienste-2165995.html
[3] http://filippo.io/Heartbleed/
[4] http://possible.lv/tools/hb/
[5] https://github.com/FiloSottile/Heartbleed
[6] https://github.com/noxxi/p5-scripts/blob/master/check-ssl-heartbleed.pl
https://www.openssl.org/news/secadv_20140407.txt
"Users unable to immediately upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.“
Bruce Schneier: “Heartbleed is a catastrophic bug in OpenSSL”
https://www.schneier.com/blog/archives/2014/04/heartbleed.html
© 2022
2014-04 SAP SE. All rights reserved. 1713
OpenSSL Heartbleed Bug
How the heartbleed bug works: http://xkcd.com/1354/
© 2022
2014-04 SAP SE. All rights reserved. 1714
OpenSSL Heartbleed Bug
SAP NetWeaver ABAP / Java
Application areas: BC-SEC-SSL, BC-JAS-SEC
Products: NetWeaver Application Server ABAP, NetWeaver Application Server Java
The crypto libraries used for applications in the
NetWeaver Application Server ABAP ("SAPCRYPTOLIB"/"CommonCryptoLib" aka Secure Login Library)
and in the
NetWeaver Application Server Java ("SAP Java Cryptographic Toolkit" aka "IAIK")
do not use OpenSSL.
We have no indications that these crypto libraries are vulnerable to the Heartbleed bug as in
the OpenSSL 1.0.1 versions.
Customers with questions may be asked to contact SAP support via a customer message.
In the event they are unsure about the component to use, they can assign their request to the Security Backoffice
component XX-SER-BO-SEC
© 2022
2014-04 SAP SE. All rights reserved. 1715
OpenSSL Heartbleed Bug
KBA/Notes
2004805 - Heartbleed (CVE-2014-0160) OpenSSL Vulnerability – Product related status and recommendations
2004903 - FAQ: OpenSSL Heartbleed vulnerability as it relates to SAP Afaria
2004565 - OpenSSL HeartBleed vulnerability. - Afaria 7
2003582 - How does The Heartbleed Bug affects SAP BusinessObjects Xi3.1 and Business Intelligence products 4/4.1
2004815 - How does The Heartbleed Bug affect SAP Data Services and Business Intelligence products 4/4.1
2004769 - SQL Anywhere, MobiLink, and the Relay Server Outbound Enabler are affected by the OpenSSL 'Heartbleed‘
2004367 - SAP BW Accelerator and OpenSSL Heartbleed bug
<to be continued>
[email protected] - No Heartbleed with SAP HANA
Blog@SCN - HANA Cloud Platform is NOT Vulnerable to Heartbleed
© 2022
2014-04 SAP SE. All rights reserved. 1716
Note 1974046 - Potential information disclosure relating to Business Data
This note seems to be an usual ABAP note as it’s related to software component SAP_BASIS.
However, you do not see any Support Package assignment or any (automatic) Correction Instructions.
© 2022
2014-04 SAP SE. All rights reserved. 1717
Note 1971516 - Code injection vulnerability in SV-SMG-SDD
Specific rule: This note deactivates obsolete coding → No special test procedures required.
How much staff do companies have to allocate to this process? It takes so much work just to
determine if the notes are relevant or not. Can the notes be better segregated (e.g. if it requires a
Kernel upgrade or not, if SAP suggests testing or not, etc.)?
© 2022
2014-04 SAP SE. All rights reserved. 1719
March 2014
Topics March 2014
© 2022
2014-03 SAP SE. All rights reserved. 1721
Patch Day Notes vs. Support Package Implementation Notes
(reloaded)
Announcement Jul 8, 2013:
Implementing SAP security fixes
Important information and call for action
SAP is continuously investing in increasing the quality and security of its products. To improve the consumability of its
security fixes and to further adjust its deployment processes to industry standards, SAP has changed the way how
security patches are provided.
SAP delivers important security fixes on its monthly Security Patch Day. SAP strongly recommends its customers to implement
security fixes, flagged with priority 1 and priority 2, primarily fixing externally reported issues. The fixes are released on the
second Tuesday of every month, and can be used to fix a particular vulnerability without needing to update a system to service
packs.
In order to further reduce the implementation efforts for our customers, other security fixes like priority 3 and 4 will generally
be delivered with support packages. SAP strongly recommends its customers to apply Support Packages on their systems
as soon as a support pack is available. The Support Packages can be found on SAP Service Marketplace in the corresponding
product area. Information about these improvements will also be published in security notes with priority 3 and 4 some
months after Support Packages have been released.
Find security notes that were previously released on SAP Service Marketplace at /securitynotes.
© 2022
2014-03 SAP SE. All rights reserved. 1722
Patch Day Notes vs. Support Package Implementation Notes
(reloaded)
PD Notes
SAP Security Notes published on and for Security Patch Day
Contain important security corrections
Very often address security issues reported from
external sources
Have CVSS scoring in most cases
Re-classification in March 2016
covering “minor, medium or high”
SPIN
Typically address security issues of minor impact
found SAP internally
Should not be published in the first place but just be contained in future SPs
Had to be published outside SP and outside the PD schedule because some
customer production issue depended on it to be implemented first
© 2022
2014-03 SAP SE. All rights reserved. 1724
Patch Day Notes vs. Support Package Implementation Notes
(reloaded)
Are Support Package Implementation Notes really
different … as soon as they are published?
➔
Use CVSS, priority and risk assessment to judge about
notes but don’t use the type as a major differentiator.
© 2022
2014-03 SAP SE. All rights reserved. 1725
Note 1900200 - Directory traversal in BC-SRV-ARL
This note belongs to the large group of “Directory Traversal” notes (>550 notes).
- You only need to implement this note and all other “Directory Traversal” notes if you are going to
maintain logical paths and logical file names using transaction FILE and report RSFILENA
- You recognize such notes because of a reference to note 1497003 / FILE_VALIDATE_NAME
- Defining logical path and file names enables you to use authorization object S_PATH
Even if you apply recent Support Packages you have to maintain the logical path and file names !
© 2022
2014-03 SAP SE. All rights reserved. 1726
Note 1966056 - Code injection vulnerability in BW
Important note as it is possible to inject arbitrary ABAP code without proper authorization check.
The solution turn the following critical code into display-only mode:
IF i_show_report EQ rs_c_true.
EDITOR-CALL FOR l_t_code.
ENDIF.
* Programm generieren
INSERT REPORT i_sx_meta-repid FROM l_t_code.
© 2022
2014-03 SAP SE. All rights reserved. 1727
Previous Webinars
Topics
© 2022
2014 SAP SE. All rights reserved. 1729
Q&A from February
In SysRec, is the "Automatic" column what used to be the identification of RSECNOTE notes ?
Well, most notes which we had selected for RSECNOTE contained automatic correction
instructions, but on the other hand, RSECNOTE only checks for a small subset of critical notes.
Therefore we cannot compare the "Automatic" column with the selection used by RSECNOTE.
Is it possible to keep track of the notes installation status in SysRec ?
In the System Recommendations tool, when you implement a security note in a managed system, will
Solution Manager detect this and update the note appropriately in System Recommendations, or do
the admins need to go into each note and mark it as implemented ?
Yes, SysRec retrieves the implementation status of notes from the managed system. Therefore,
with the next run of the background job of SysRec all implemented notes will vanish. The
implementation status of a note will be transported to the production system as well.
Because of this you can configure SysRec to calculate the worklist for development systems as well
as to calculate the implementation status in production systems.
© 2022
2014 SAP SE. All rights reserved. 1730
Q&A from February
For the notes for which SysRec cannot determine the applicability, I guess they will always appear in
the list, even if they are actually implemented ?
Yes, that’s true. You either can set a status in SysRec (however, there does not exists a status
value ‘done’) or in case of ABAP you can still use transaction SNOTE: Even if you cannot
implement a note with SNOTE you can download the note and set the status to “completed”
manually which is than used by SysRec to hide the note (but as far as I know you cannot transport
this status to the production system).
Is there documentation on the security authorizations required in Solution Manger for the Security
Service or a template role from SAP with the required authority?
In addition to standard authorizations for authorization objects D_SOL_VSBL (to get access to the
systems of a solution) and AI_LMDB_PS and AI_LMDB_OB (to read data from the LMDB) you
need specific authorizations for SM_FUNCS (respective SM_TABS in SolMan 7.0) to see the
different tabs of the SysRec.
http://wiki.scn.sap.com/wiki/display/SMAUTH/SM_FUNCS
http://scn.sap.com/blogs/ben.schneider/2011/04
© 2022
2014 SAP SE. All rights reserved. 1731
Links
Security Notes
https://support.sap.com/securitynotes
Configuration Validation
http://wiki.sdn.sap.com/wiki/display/TechOps/ConfVal_Home
© 2022
2014 SAP SE. All rights reserved. 1732
The Future of the EWA Security Notes Subchapter
Current situation
▪ The EWA subchapter “SAP Security Notes: ABAP and Kernel Software Corrections” is currently based
on RSECNOTE.
▪ RSECNOTE is technically working. However, in the meantime the content, which Security Notes are
recommended by RSECNOTE, is only maintained sporadically for SAP-internal reasons.
▪ The tool “System Recommendations” and the quality of SAP Security Notes have improved.
Recommendation
▪ Use the Solution Manager based Tool “System Recommendations” for your monthly security maintenance
process (which is recommended anyhow since even in the past RSECNOTE and thus the EWA only checked
for a selected subset of Security Notes)
Intended direction
▪ We are currently evaluating to base the above mentioned EWA subchapter directly onto System
Recommendations. So if you are using System Recommendations you are in our strategic direction.
However, no timeline is available yet for this change nor any technical details.
▪ As soon as the EWA subchapter no longer requires RSECNOTE technically, the tool RSECNOTE is planned to
be discontinued.
© 2022
2014 SAP SE. All rights reserved. 1733
How to find HANA Security Notes, e.g. 1964428 - XS bypasses
authentication for former public applications
© 2022
2014 SAP SE. All rights reserved. 1734
Note 1903756 - DB6: Authorization to execute operating system
commands
Important note, Published in November 2013
Issue: Note cannot be implemented in most systems as function DB6_DIAG_GET_PROGRAM_VERSION
exists only in DB2/DB6-Systems
➔ Create Support Ticket if you run into trouble while implementing security notes!
➔ Solved since end of January.
© 2022
2014 SAP SE. All rights reserved. 1735
Note 1963100 - Disabling execution of operating system commands
using a CTC URL
HotNews
CVSS Base Score 9.0
CVSS Base Vector AV:N/AC:L/AU:S/C:C/I:C/A:C
Java, LIFECYCLE MGMT TOOLS as of 6.40
The CTC application contains vulnerability where any operating system command can be executed on
an AS Java host using NWA credentials through a URL invocation. Typically, this requires
authentication using NWA credentials. If you have not already implemented SAP security note
1445998, then this can be done without authentication using NWA credentials.
Note 1445998 - Disabling invoker servlet (Released in December 2010)
The Invoker Servlet has been disabled by default as of 7.20
© 2022
2014 SAP SE. All rights reserved. 1736
Various notes about hard coded user names
Few of these notes is really important from a security point of view – but of course it’s better to get rid
of these hard coded user names from a functional point of view.
Caution: Notes of this type could show a critical security vulnerability
© 2022
2014 SAP SE. All rights reserved. 1737
Various notes about hard coded user names
© 2022
2014 SAP SE. All rights reserved. 1738
Topics
© 2022
2014 SAP SE. All rights reserved. 1739
Note 1773912 - Missing authorization check in message server
It would be sufficent to update the msg_server. You do not need to update the whole kernel
disp+work.
© 2022
2014 SAP SE. All rights reserved. 1740
Note 1906927 - Missing authorization check in Accounting BAPIs
Requires note 1882417 and 1908870 and 1923728 including extensive manual activities.
© 2022
2014 SAP SE. All rights reserved. 1741
Note 1931016 - Missing authorization check in ABAP Runtime
Analysis
© 2022
2014 SAP SE. All rights reserved. 1742
Note 1942424 - Missing authorization check in SV-SMG-ASU
© 2022
2014 SAP SE. All rights reserved. 1743
Patch Day Notes vs. Support Package Implementation Notes
SAP delivers important security fixes on its monthly Security Patch Day. SAP strongly recommends its customers to implement
security fixes, flagged with priority 1 and priority 2, primarily fixing externally reported issues. The fixes are released on the
second Tuesday of every month, and can be used to fix a particular vulnerability without needing to update a system to service
packs.
In order to further reduce the implementation efforts for our customers, other security fixes like priority 3 and 4 will generally
be delivered with support packages. SAP strongly recommends its customers to apply Support Packages on their systems
as soon as a support pack is available. The Support Packages can be found on SAP Service Marketplace in the corresponding
product area. Information about these improvements will also be published in security notes with priority 3 and 4 some
months after Support Packages have been released.
Find security notes that were previously released on SAP Service Marketplace at /securitynotes.
© 2022
2014 SAP SE. All rights reserved. 1744
Patch Day Notes vs. Support Package Implementation Notes
First note ever which deals with vulnerabilities in IDES demo system
Release independent note = no assignment to any product, software component, release, support
package
→ potential relevant for all customer systems as far as System Recommendations can analyze it
→ all customers ‘see’ the note
Solution via ABAP transport. Normally we forbid transports in notes, however, in this special case there
is no other efficient way and I assume that it works fine.
The transport contains delete/deactivation actions for RFC enabled functions in the customer name
range.
➔ If you go for this note you should consider to apply all other security notes to IDES as well.
© 2022
2014 SAP SE. All rights reserved. 1747
Note 1864518 - Security Improvements for MOB-APP-EMR-AND
© 2022
2014 SAP SE. All rights reserved. 1748
Security Notes of software component ST-PI
Some notes about software component ST-PI describe the complete validity range in the text only -
which cannot be interpreted by System Recommendations.
Example: "Apply Support Package ST-PI 2008_1_* SP08."
Tipp: Use search on https://support.sap.com/securitynotes to find notes of application component
SV-SMG-SDD (which is related to software component ST-PI).
The good news: Security Notes of software component ST-PI and ST-A/PI are only relevant for the
connectivity to the SAP Solution Manager. Therefore you can apply them without any influence to
productive business processes within the backend system.
Number Application Area Short text Priority Released On Validity/Corr/SP
1896785 SV-SMG-SDD Missing authorization check in ST-PI High 10.09.2013 4/4/2
1861791 SV-SMG-SDD OS CMD injection vulnerability in ST-PI High 13.08.2013 3/3/1
1688229 SV-SMG-SDD Information disclosure due to missing auth. in EWA functions High 13.08.2013 5/5/2
1774432 SV-SMG-SDD Missing authorization check in ST-PI Medium 11.06.2013 4/0/0
1788614 SV-SMG-SDD Missing authorization check in ST-PI High 12.02.2013 4/4/1
1727914 SV-SMG-SDD Missing authorization checks in ST-PI Very high 14.08.2012 4/4/1
1720994 SV-SMG-SDD Missing authorization check in ST-PI High 10.07.2012 4/4/1
1727119 SV-SMG-SDD Update 1 to security note 1642810 Medium 08.06.2012 (update note)
1642810 SV-SMG-SDD Code injection vulnerability in SV-SMG-SDD Medium 08.05.2012 SAP_BASIS
© 2022
2014 SAP SE. All rights reserved. 1749
Note 1854408 - Potential information disclosure relating to user
password in GRC AC 10
This note contains design changes related to user password provisioning, so it is suggested to
implement it very cautiously and conduct intensive regression testing before moving this to production.
© 2022
2014 SAP SE. All rights reserved. 1750
Note 1823566 - Potential information disclosure relating to
SAP Solution Manager
© 2022
2014 SAP SE. All rights reserved. 1751
Note 1820666 - Potential remote code execution in SAProuter
© 2022
2014 SAP SE. All rights reserved. 1752
Thank you!
Contact information:
Frank Buchholz
SAP CoE Security Services
[email protected]
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE.
The information contained herein may be changed without prior notice.
Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors.
These materials are provided by SAP SE and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and
SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in
the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty.
SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE in Germany and other
countries.
Weitergabe und Vervielfältigung dieser Publikation oder von Teilen daraus sind, zu welchem Zweck und in welcher Form auch immer, ohne die ausdrückliche schriftliche
Genehmigung durch SAP SE nicht gestattet. In dieser Publikation enthaltene Informationen können ohne vorherige Ankündigung geändert werden.
Einige der von der SAP SE und ihren Distributoren vermarkteten Softwareprodukte enthalten proprietäre Softwarekomponenten anderer Softwareanbieter.
Die vorliegenden Unterlagen werden von der SAP SE und ihren Konzernunternehmen („SAP-Konzern“) bereitgestellt und dienen ausschließlich zu Informationszwecken.
Der SAP-Konzern übernimmt keinerlei Haftung oder Gewährleistung für Fehler oder Unvollständigkeiten in dieser Publikation. Der SAP-Konzern steht lediglich für Produkte
und Dienstleistungen nach der Maßgabe ein, die in der Vereinbarung über die jeweiligen Produkte und Dienstleistungen ausdrücklich geregelt ist. Keine der hierin
enthaltenen Informationen ist als zusätzliche Garantie zu interpretieren.
SAP und andere in diesem Dokument erwähnte Produkte und Dienstleistungen von SAP sowie die dazugehörigen Logos sind Marken oder eingetragene Marken der SAP
SE in Deutschland und verschiedenen anderen Ländern weltweit.
Weitere Hinweise und Informationen zum Markenrecht finden Sie unter http://www.sap.com/corporate-en/legal/copyright/index.epx#trademark.