Trustwave SpiderLabs Security Advisory TWSL2015-023: Missing authorization check in SAP Adaptive Server Enterprise Published: 12/09/2015 Version: 1.0 Vendor: SAP (www.sap.com) Product: Adaptive Server Enterprise (ASE) Version affected: 15.7, 16.0 Product description: Relational database management system for UNIX, Linux, and Windows platforms. Finding 1: Unauthorized system extended stored procedures invocation Credit: Martin Rakhmanov of Trustwave CVE: CVE-2015-8518 It is possible for users granted CREATE PROCEDURE privilege to invoke system stored procedures which they normally do not have access to. For example, a user can redefine xp_cmdshell system stored procedure in his database and then invoke it: CREATE PROCEDURE xp_cmdshell (@cmdstr varchar(200)) AS EXTERNAL NAME 'sybsyesp' GO Then it can invoke it bypassing normal security checks. It is possible to override other procedures defined in the sybsyesp as well. Remediation Steps: Apply one of these following vendor supplied patches: SAP ASE 15.7 SP136 SAP ASE Cluster Edition 15.7 SP136 SAP ASE 16.0 SP02 PL01 HF1 Revision History: 09/01/2015 - Vulnerability disclosed to vendor 12/08/2015 - Patch released by vendor 12/09/2015 - Advisory published References 1. https://websmp230.sap-ag.de/sap/support/notes/2240755 About Trustwave: Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. More than three million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective threat, vulnerability and compliance management. Trustwave is headquartered in Chicago, with customers in 96 countries. For more information about Trustwave, visit https://www.trustwave.com. About Trustwave SpiderLabs: SpiderLabs(R) is the advanced security team at Trustwave focused on application security, incident response, penetration testing, physical security and security research. The team has performed over a thousand incident investigations, thousands of penetration tests and hundreds of application security tests globally. In addition, the SpiderLabs Research team provides intelligence through bleeding-edge research and proof of concept tool development to enhance Trustwave's products and services. https://www.trustwave.com/spiderlabs Disclaimer: The information provided in this advisory is provided "as is" without warranty of any kind. Trustwave disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Trustwave or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Trustwave or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.