Services Vulnerabilities Exploits Publications News Blog About DSecRG

[DSECRG-11-014] SAP GUI (sapgui) - DLL hijacking

SAP Front End applications (SAPGui.exe) are vulnerable to DLL hijacking attacks. It makes possible to remote code execution

Digital Security Research Group [DSecRG] Advisory DSecRG-11-014 (Internal DSecRG-00183)

Application: SAP GUI
Versions Affected: 6.4 - 7.2
Vendor URL:
Bugs: DLL hijacking
Exploits: YES
Reported: 24.08.2010
Vendor response: 26.08.2010
Date of Public Advisory: 09.03.2011
Author: Alexey Sintsov, Alexandr Polyakov
Digital Security Research Group [DSecRG] (research [at] dsecrg [dot] com)

SAP Front End applications (SAPGui.exe) are vulnerable to DLL hijacking attacks. It makes possible to remote code execution.

Attacker can place shortcuts for SAP GUI (.sap) on his share directory. In the same directory he place DLL's with evil code.
Name of DLL will be MFC80RUS.DLL(for Russian systems) or MFC80LOC.DLL for SAPGui.exe. Than attacker get link to shortcut to a victim. When victim try to open shortcuts, SAP application try to load it DLL's from working dir that is attacker share directory. So attacker's DLL's will be loaded by victim and evil code from this libraries will be executed. It is because SAPGui.exe and BExAnalyzer.exe try to find the directory in work path before system directories.


Fix Information
Solution to this issue is given in the 1511179 security note.

Digital Security:
Is one of the leading IT security companies in CEMEA, providing information security consulting, audit and penetration testing services, ERP and SAP security assessment, certification for ISO/IEC 27001:2005 and PCI DSS and PA DSS standards.

Digital Security Research Group:
International subdivision of Digital Security company focused on research and software development for securing business-critical systems like: enterprise applications (ERP,CRM,SRM), technology systems (SCADA, Smart Grid) and banking software. DSecRG developed new product "ERPSCAN security suite for SAP" and service "ERPSCAN Online" which can help customers to perform automated security assessments and compliance checks for SAP solutions.

Contact: research [at] dsecrg [dot] com

Vulnerabilities RSS RSS
[DSECRG-12-019] vCenter Orchestrator - password disclosure

[DSECRG-12-018] Oracle Application Server - multiple security vulnerabilities

[DSECRG-12-017] ASUS Net4Switch ipswcom.dll ActiveX - buffer overflow vulnerability

[DSECRG-12-016] SAP MessagingSystem - information disclosure

[DSECRG-12-014] SAP Internet Sales - XSS

[DSECRG-12-015] SAP Adapter Monitor - information disclosure

Vulnerabilities list

© 2002—2014, ERPScan
For quoting or using materials from this site
link is obligatory

+44 (20) 81334493    e-mail:
Rss: Vulnerabilities, Exploits, News, Publications, Summary