Advisory
On 08.07.2025 a security relevant correction has been released by SAP SE. The manufacturer resolves an issue within SAPCAR.
SAP Note 3595143 addresses "[CVE-2025-43001] Multiple Privilege Escalation Vulnerabilities in SAPCAR" to prevent insufficient security function with a medium risk for exploitation.
A workaround does not exist, according to SAP Security Advisory team. It is advisable to implement the correction as monthly patch process, the team suggests.
Risk specification
SAPCAR contains vulnerabilities that allow an authenticated attacker with high privileges to extract specially crafted SAR archives capable of overriding directory and file permissions during unpacking. This can lead to unauthorized modification of critical system files. Additionally, the attacker may craft SAR archives with manipulated symbolic links and file attributes, enabling privilege escalation by tampering with system-level files during extraction.Solution
The SAPCAR tool has been updated to mitigate privilege escalation by (1) excluding the current and parent directories during archive creation and ignoring them during extraction; (2) disabling the s-bit for files by default during extraction—however, for backward compatibility, an option -xkeepsbit is provided to retain the old behavior of preserving the s-bit, which should be used with caution due to security risks; and (3) performing consistency checks on symbolic links to ensure only legitimate links with correct attributes are extracted, without modifying the permissions of their targets.
- 9.0 [CVE-2023-0014] Capture-replay vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
- 8.5 [CVE-2022-41268] Privilege escalation vulnerability in SAP Business Planning and Consolidation
- 6.7 [CVE-2022-35295] Privilege Escalation Vulnerability in SAPOSCOL on Unix
- 6.5 Information Disclosure vulnerability in SAP Business Client
- 6.3 [CVE-2021-21472] Server password not set during installation of SAP NetWeaver Master Data Management 7.1