Home page logo
/

bugtraq logo Bugtraq mailing list archives

[DSECRG-11-031] SAP RFC EPS_DELETE_FILE - Authorisation bypass, smbrelay
From: Alexandr Polyakov <alexandr.polyakov () dsec ru>
Date: Thu, 17 Nov 2011 20:20:01 +0400

[DSECRG-11-031] SAP RFC EPS_DELETE_FILE - Authorisation bypass, smbrelay

Security vulnerability was founded in sap EPS_DELETE_FILE RFC function allows attacker to delete files remotely or 
steal hashes of SAP server account in windows environment using SMBRelay attack.


Digital Security Research Group [DSecRG] Advisory (Internal #DSECRG-00195)

Application: SAP NetWeaver ABAP 
Versions Affected: SAP NetWeaver ABAP 
Vendor URL: www.sap.com
Bugs: Auth bypass, directory traversal, smbrelay
Exploits: YES
Reported:        15.01.2011
Vendor response: 25.01.2011
Date of Public Advisory:22.08.2011 
CVE-number: 
Author: Alexey Sintsov from DSecRG (ERPScan subdivision)

Description
***********

Security vulnerability was founded in sap EPS_DELETE_FILE RFC function allows attacker to delete files remotely or 
steal hashes of SAP server account in windows environment using SMBRelay attack.

Details
*******
Attacker that can execute function EPS_DELETE_FILE remotely using default SAP accounts like TMSADM or SAPCPIC to delete 
any file in OS or send hashes of SAP account to remote host or conduct smbrelay attack.

Example:
******
Working exploit will be available in commercial scanner ERPScan Security Scanner for SAP (http://erpscan.com) and also 
in ERPScan pentesting tool.

References
**********
http://dsecrg.com/pages/vul/show.php?id=331
http://www.sdn.sap.com/irj/sdn/index?rid=/webcontent/uuid/c05604f6-4eb3-2d10-eea7-ceb666083a6a
https://service.sap.com/sap/support/notes/1554030


Fix Information
*************
Solution to this issue is given in the SAP Security Note 1554030.


About DSecRG
*******
The main mission of DSecRG is to conduct researches of business critical systems such as ERP, CRM, SRM, BI, SCADA, 
banking software and others. The result of this work is then integrates in ERPScan Security Scanner. Being on the top 
edge of ERP and SAP security DSecRG research helps to improve a quality of ERPScan consulting services and protects you 
from the latest threads. 
Contact: research [at] dsecrg [dot] com
http://www.dsecrg.com 

About ERPScan
*******
ERPScan is an innovative company engaged in the research of ERP security and develops products for ERP system security 
assessment. Apart from this the company renders consulting services for secure configuration, development and 
implementation of ERP systems, and conducts comprehensive assessments and penetration testing of custom solutions.
Our flagship products are "ERPScan Security Scanner for SAP" and service "ERPScan Online" which can help customers to 
perform automated security assessments and compliance checks for SAP solutions.

Contact: info [at] erpscan [dot] com

Polyakov Alexander
CTO ERPScan
Head of DSecRG
______________________
phone:  +7 812 703 1547
        +7 812 430 9130
e-mail: a.polyakov () erpscan com

www.erpscan.com
www.dsecrg.com


-----------------------------------
This message and any attachment are confidential and may be privileged or otherwise protected 
from disclosure. If you are not the intended recipient any use, distribution, copying or disclosure 
is strictly prohibited. If you have received this message in error, please notify the sender immediately 
either by telephone or by e-mail and delete this message and any attachment from your system. Correspondence 
via e-mail is for information purposes only. Digital Security neither makes nor accepts legally binding 
statements by e-mail unless otherwise agreed. 
-----------------------------------


  By Date           By Thread  

Current thread:
  • [DSECRG-11-031] SAP RFC EPS_DELETE_FILE - Authorisation bypass, smbrelay Alexandr Polyakov (Nov 17)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]