Vulnerabilities > CVE-2008-4830 - Remote Code Execution vulnerability in SAP AG SAPgui KWEdit ActiveX Control Insecure Method

047910
CVSS 9.3 - CRITICAL
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
COMPLETE
Integrity impact
COMPLETE
Availability impact
COMPLETE
network
sap
critical
nessus
exploit available
metasploit

Summary

Insecure method vulnerability in the KWEdit ActiveX control in SAP GUI 6.40 Patch 29 (KWEDIT.DLL 6400.1.1.41) and 7.10 Patch 5 (KWEDIT.DLL 7100.1.1.43) allows remote attackers to (1) overwrite arbitrary files via the SaveDocumentAs method or (2) read or execute arbitrary files via the OpenDocument method.

Vulnerable Configurations

Part Description Count
Application
Sap
2

Exploit-Db

descriptionEnjoySAP SAP GUI ActiveX Control Arbitrary File Download. CVE-2008-4830. Remote exploit for windows platform
idEDB-ID:16493
last seen2016-02-01
modified2010-12-01
published2010-12-01
reportermetasploit
sourcehttps://www.exploit-db.com/download/16493/
titleEnjoySAP SAP GUI ActiveX Control Arbitrary File Download

Metasploit

descriptionThis module allows remote attackers to place arbitrary files on a users file system by abusing the "Comp_Download" method in the SAP KWEdit ActiveX Control (kwedit.dll 6400.1.1.41).
idMSF:EXPLOIT/WINDOWS/BROWSER/ENJOYSAPGUI_COMP_DOWNLOAD
last seen2020-06-10
modified2017-07-24
published2010-12-01
references
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/browser/enjoysapgui_comp_download.rb
titleEnjoySAP SAP GUI ActiveX Control Arbitrary File Download

Nessus

NASL familyWindows
NASL idSAPGUI_KWEDIT_ACTIVEX.NASL
descriptionThe version of the KWEdit ActiveX control on the remote host is reportedly affected by a remote code execution vulnerability. The control provides the insecure method
last seen2020-06-01
modified2020-06-02
plugin id36163
published2009-04-15
reporterThis script is Copyright (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/36163
titleSAP GUI KWEdit ActiveX Control SaveDocumentAs() Insecure Method
code
#
# (C) Tenable Network Security, Inc.
#


include("compat.inc");

if (description)
{
  script_id(36163);
  script_version("1.13");

  script_cve_id("CVE-2008-4830");
  script_bugtraq_id(34524);
  script_xref(name:"Secunia", value:"32869");

  script_name(english:"SAP GUI KWEdit ActiveX Control SaveDocumentAs() Insecure Method");
  script_summary(english:"Checks for control");

  script_set_attribute(attribute:"synopsis", value:
"The remote Windows host has an ActiveX control that is affected by a
remote code execution vulnerability." );
  script_set_attribute(attribute:"description", value:
"The version of the KWEdit ActiveX control on the remote host is
reportedly affected by a remote code execution vulnerability. The
control provides the insecure method 'SaveDocumentAs()', which saves
an HTML document to a specified location. This can be exploited in
combination with e.g. the 'OpenDocument()' method to disclose file
contents or to execute arbitrary code on the affected host subject to
the user's privileges.");
  script_set_attribute(attribute:"see_also", value:"https://secuniaresearch.flexerasoftware.com/secunia_research/2008-56/" );
  script_set_attribute(attribute:"solution", value:
"Upgrade to the latest version and verify the kill bit is set." );
 script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
 script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
 script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
 script_set_attribute(attribute:"exploit_available", value:"true");
 script_set_attribute(attribute:"metasploit_name", value:'EnjoySAP SAP GUI ActiveX Control Arbitrary File Download');
 script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
 script_set_attribute(attribute:"plugin_publication_date", value: "2009/04/15");
 script_cvs_date("Date: 2018/11/15 20:50:28");
  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe",value:"cpe:/a:sap:sap_gui");
  script_end_attributes();
  
  script_category(ACT_GATHER_INFO);
  script_family(english:"Windows");

  script_copyright(english:"This script is Copyright (C) 2009-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("smb_hotfixes.nasl");
  script_require_keys("SMB/Registry/Enumerated");
  script_require_ports(139, 445);

  exit(0);
}

include("global_settings.inc");
include("smb_func.inc");
include("smb_activex_func.inc");

if (!get_kb_item("SMB/Registry/Enumerated")) exit(0);

# Locate the file used by the controls
if (activex_init() != ACX_OK) exit(0);

clsid = '{2137278D-EF5C-11D3-96CE-0004AC965257}';
file = activex_get_filename(clsid:clsid);
if (file)
{
  ver = activex_get_filename(clsid:clsid);

  if (ver) ver = string("Version ", ver);
  else ver = string("An unknown version");

  report = NULL;
  if (report_paranoia > 1)
    report = string(
      "\n",
      ver, " of the vulnerable control is installed as :\n",
      "\n",
      "  ", file, "\n",
      "\n",
      "Note, though, that Nessus did not check whether the kill bit was \n",
      "set for the control's CLSID because the Report Paranoia setting \n",
      "was in effect when this scan was run.\n"
    );
  else if(activex_get_killbit(clsid:clsid) == 0)
    report = string(
      "\n",
      ver, " of the vulnerable control is installed as :\n",
      "\n",
      "  ", file, "\n",
      "\n",
      "Moreover, its kill bit is not set so it is accessible via Internet\n",
      "Explorer.\n"
    );
  if (report)
  {
    if (report_verbosity > 0)
      security_hole(port:kb_smb_transport(), extra:report);
    else
      security_hole(kb_smb_transport());
  }
}
activex_end();

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/96318/enjoysapgui_comp_download.rb.txt
idPACKETSTORM:96318
last seen2016-12-05
published2010-12-03
reporterMC
sourcehttps://packetstormsecurity.com/files/96318/EnjoySAP-SAP-GUI-ActiveX-Control-Arbitrary-File-Download.html
titleEnjoySAP SAP GUI ActiveX Control Arbitrary File Download

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 34524 CVE(CAN) ID: CVE-2008-4830 SAPgui是SAP软件的图形用户界面客户端。 SAPgui所捆绑的KWEdit ActiveX控件(KWEDIT.DLL)提供了不安全的SaveDocumentAs()函数。如果用户受骗访问了恶意网页的话,该函数可能将 HTML文档保存到指定的位置。如果结合OpenDocument()方式的话,远程攻击者就可以泄露任意文件的内容,或在用户系统上执行任意代码。 SAP Sapgui 7.10 Patch 5 SAP Sapgui 6.40 Patch 29 SAP --- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: <a href=https://service.sap.com/sap/support/notes/1294913 target=_blank rel=external nofollow>https://service.sap.com/sap/support/notes/1294913</a>
idSSV:5063
last seen2017-11-19
modified2009-04-16
published2009-04-16
reporterRoot
titleSAP GUI KWEdit ActiveX控件不安全SaveDocumentAs()调用漏洞