Loading HuntDB...

Found multiple SAP NetWeaver vulnerable services

High
A
Acronis
Submitted None

Team Summary

Official summary from Acronis

The report is not applicable since redapi.acronis.com and redapi2.acronis.com are internally developed systems not related to SAP NetWeaver.

Reported by ganofins

Vulnerability Details

Technical details and impact analysis

# Summary: Hello Team, I found two (**redapi.acronis.com** and **redapi2.acronis.com**) sap Netweaver vulnerable services. They do not perform an authentication check which allows an attacker without prior authentication to execute configuration tasks to perform critical actions against the SAP Java system, including the ability to create an administrative user, and therefore compromising Confidentiality, Integrity, and Availability of the system, leading to Missing Authentication Check. # Steps To Reproduce: 1. Run the script {F1195428} 2. You will see random user created # POC: Just for the POC, I have created a random user with creds sapRpoc9049:Secure!PwD6751 (at redapi.acronis.com) {F1195413} # References: https://github.com/chipik/SAP_RECON https://nvd.nist.gov/vuln/detail/CVE-2020-6286 https://nvd.nist.gov/vuln/detail/CVE-2020-6287 https://launchpad.support.sap.com/#/notes/2934135 https://launchpad.support.sap.com/#/notes/2939665 **Please lemme know if you need any additional information reagarding this** ## Impact # Impact: This version of SAP netweaver does not perform an authentication check which allows an attacker without prior authentication to execute configuration tasks to perform critical actions against the SAP Java system, including the ability to create an administrative user, and therefore compromising Confidentiality, Integrity, and Availability of the system, leading to Missing Authentication Check.

Related CVEs

Associated Common Vulnerabilities and Exposures

SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.50, does not perform an authentication check which allows an attacker without prior authentication to execute configuration tasks to perform critical actions against the SAP Java system, including the ability to create an administrative user, and therefore compromising …

The insufficient input path validation of certain parameter in the web service of SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.50, allows an unauthenticated attacker to exploit a method to download zip files to a specific directory, leading to Path Traversal.

Report Details

Additional information and metadata

State

Closed

Substate

Duplicate

Submitted