SAP GUI KWEdit ActiveX Control SaveDocumentAs() Insecure Method

high Nessus Plugin ID 36163

Synopsis

The remote Windows host has an ActiveX control that is affected by a remote code execution vulnerability.

Description

The version of the KWEdit ActiveX control on the remote host is reportedly affected by a remote code execution vulnerability. The control provides the insecure method 'SaveDocumentAs()', which saves an HTML document to a specified location. This can be exploited in combination with e.g. the 'OpenDocument()' method to disclose file contents or to execute arbitrary code on the affected host subject to the user's privileges.

Solution

Upgrade to the latest version and verify the kill bit is set.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2008-56/

Plugin Details

Severity: High

ID: 36163

File Name: sapgui_kwedit_activex.nasl

Version: 1.13

Type: local

Agent: windows

Family: Windows

Published: 4/15/2009

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:sap:sap_gui

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Exploitable With

Metasploit (EnjoySAP SAP GUI ActiveX Control Arbitrary File Download)

Reference Information

CVE: CVE-2008-4830

BID: 34524

Secunia: 32869