Sage X3 RCE Bugs - CVE-2020-7387 to 7390

Security researchers recently uncovered four nasty bugs in the Sage X3 enterprise resource planning (ERP) platform. The platform is targeted at mid-sized companies, specifically in the manufacturing and distributor space, who are looking for an all-encompassing ERP platform. The platform manages multiple critical sectors of business like sales, inventory, finance, purchasing and other customer related functionalities.

Researchers at Rapid7, including Jonathan Peterson, Aaron Herndon, Cale Black, Ryan Villarreal, and William Vu, discovered the bugs (CVE-2020-7387 through -7390) and said that the most severe of the flaws exist in the remote administrator function of the ERP. The team came to the conclusion that there could be supply-chain ramifications as a result of threat actors leveraging these bugs; much like what was seen with the SUNBURST/Solarwinds attack or initial reports of the Kaseya attacks.

The Vulnerabilities

From top to bottom, the first two vulnerabilities in the table below are protocol related flaws involving remote admin of Sage X3. The latter two vulnerabilities are web application bugs. Per Rapid7's researchers that discovered these bugs, "... Sage X3 installations should not be exposed directly to the internet, and should instead be made available via a secure VPN connection where required". By following the advice provided by the team, organizations should be able to effectively mitigate all of the vulnerabilities detailed below (provided by Rapid7):


CVE IdentifierCWE IdentifierCVSS score (Severity)Remediation
CVE-2020-7388CWE-290: Unauthenticated Command Execution Bypass by Spoofing in AdxAdmin10.0 (Critical)Update available
CVE-2020-7387CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in AdxAdmin5.3 (Medium)Update available
CVE-2020-7389CWE-306 Missing Authentication for Critical Function in Developer Environment in Syracuse5.5 (Medium)No fix planned, as this is a development function and not a production function.
CVE-2020-7390CWE-79: Persistent Cross-Site Scripting (XSS) in Syracuse4.6 (Medium)Update available (note, this affects V12 only, unlike the other issues which affects V9 and V11 as well)


For accurate information on how these exploits function and their impact, please visit Rapid7's blog post regarding the findings here.

Sage's response:

"Sage takes the security of its customer solutions extremely seriously, and regularly undertakes proactive testing across its products to identify potential vulnerabilities and provide fixes. We are grateful to Rapid7, who recently made Sage aware of a vulnerability in our on-premise Sage X3 product. Sage and its Partners have issued a fix for the vulnerability, contacted all applicable customers and advised them on the onward process – more information can be found here – with information on Sage X3 security best practices here."


Relevant Articles

https://www.rapid7.com/blog/post/2021/07/07/cve-2020-7387-7390-multiple-sage-x3-vulnerabilities/

https://threatpost.com/critical-sage-x3-rce-bug-allows-full-system-takeovers/167612/

https://www.sagecity.com/support_communities/sage_erp_x3/f/sage-x3-announcements-news-and-alerts/169216/sage-x3-product-fix-for-security-vulnerability-has-been-posted-to-kb-110640

Comments

Popular posts from this blog

Russian GRU Unit 29155 recent operations