SAP DB / MaxDB Cons Program Arbitrary Command Execution

This script is Copyright (C) 2008-2014 Tenable Network Security, Inc.


Synopsis :

The remote database service allows execution of arbitrary commands.

Description :

The version of SAP DB / MaxDB installed on the remote host fails to
sanitize user-supplied input to the 'show' and 'exec_sdbinfo' commands
before passing it to a 'system()' call. An unauthenticated, remote
attacker can leverage this issue to execute arbitrary commands on the
affected host subject to the privileges under which the service
operates, which under Windows is SYSTEM.

See also :

http://archives.neohapsis.com/archives/bugtraq/2008-01/0102.html
https://www.sdn.sap.com/irj/sdn/thread?threadID=697805&tstart=50
http://maxdb.sap.com/webpts?wptsdetail=yes&ErrorType=0&ErrorID=1152820

Solution :

Upgrade to MaxDB version 7.6.03 Build 15 (7.6.03.15) or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 9.5
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: Databases

Nessus Plugin ID: 29924 ()

Bugtraq ID: 27206

CVE ID: CVE-2008-0244