Advisory
On 14.06.2022 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within ABAP Java HANA platform.
SAP Note 3158619 addresses "[CVE-2022-29614] Privilege Escalation in SAP startservice of SAP NetWeaver AS ABAP, AS Java, ABAP Platform and HANA Database" to prevent os command injection with a medium risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as part of maintenance, the team suggests.
Risk specification
SAP startservice - of SAP NetWeaver Application Server ABAP, Application Server Java, ABAP Platform and HANA Database - on Unix systems, s-bit helper program sapuxuserchk, can be abused physically resulting in a privilege escalation of a highly privileged attacker leading to low impact on confidentiality and integrity, but a profound impact on availability.
Solution
The vulnerability has been fixed by appropriate handling of the s-bit of sapuxuserchk.
The advisory is valid for
- KERNEL 7.22 32
- KERNEL 7.49 23
- KERNEL 7.53 51
- KERNEL 7.77 48
- KERNEL 7.81 24
- KERNEL 7.85 25
- KERNEL 7.86 10
- KERNEL 7.87 7
- KERNEL 7.88 5
- KRNL64NUC 7.22 38
- KRNL64NUC 7.22EXT 38
- KRNL64NUC 7.49 24
- KRNL64UC 7.22 38
- KRNL64UC 7.22EXT 38
- KRNL64UC 7.49 24
- KRNL64UC 7.53 51
- SAPHOSTAGENT 7.22 12
