Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

CVE-2020-6282 Server-Side Request Forgery in SAP NetWeaver AS JAVA (IIOP service), SAP security note 2896025

Description

UPDATE 25th August 2020: This note has been re-released with updated ‘validity’, and ‘Support Packages & Patches’ information. We added the below SP’s and the corresponding patches.

CORETOOLS15P patch #5 (SP-level #15)

CORETOOLS14P patch #7 (SP-level #14)

CORETOOLS13P patch #9 (SP-level #13)

IIOP service allows an attacker to send a crafted request from a vulnerable web application. It is usually used to target internal systems behind firewalls that are normally inaccessible to an attacker from the external network, resulting in a Server-Side Request Forgery vulnerability.

Some well-known impacts of SSRF vulnerability are:

  • Scan internal network to determine internal infrastructure
  • Information gathering for further exploits/attacks
  • Perform a Remote File Inclusion attack
  • Retrieve server files (including /etc/passwd and more).
  • Bypass Firewall and force the vulnerable server perform your malicious requests.

Under certain conditions, the SAP NetWeaver Application Server Java IIOP implementation allows port scanning to be performed against another internal host.

Available fix and Supported packages

  • SERVERCORE | 7.10 | 7.10
  • SERVERCORE | 7.11 | 7.11
  • SERVERCORE | 7.20 | 7.20
  • SERVERCORE | 7.30 | 7.30
  • SERVERCORE | 7.31 | 7.31
  • SERVERCORE | 7.40 | 7.40
  • SERVERCORE | 7.50 | 7.50
  • CORE-TOOLS | 7.10 | 7.11
  • CORE-TOOLS | 7.20 | 7.20
  • CORE-TOOLS | 7.30 | 7.30
  • CORE-TOOLS | 7.31 | 7.31
  • CORE-TOOLS | 7.40 | 7.40
  • CORE-TOOLS | 7.50 | 7.50
  • J2EE ENGINE CORE TOOLS 7.10 | SP022 | 000004
  • J2EE ENGINE CORE TOOLS 7.10 | SP023 | 000004
  • J2EE ENGINE CORE TOOLS 7.10 | SP024 | 000004
  • J2EE ENGINE CORE TOOLS 7.10 | SP025 | 000001
  • J2EE ENGINE CORE TOOLS 7.11 | SP014 | 000006
  • J2EE ENGINE CORE TOOLS 7.11 | SP015 | 000004
  • J2EE ENGINE CORE TOOLS 7.11 | SP016 | 000003
  • J2EE ENGINE CORE TOOLS 7.11 | SP017 | 000004
  • J2EE ENGINE CORE TOOLS 7.11 | SP018 | 000004
  • J2EE ENGINE CORE TOOLS 7.11 | SP019 | 000004
  • J2EE ENGINE CORE TOOLS 7.11 | SP020 | 000000
  • J2EE ENGINE CORE TOOLS 7.20 | SP009 | 000032
  • J2EE ENGINE CORE TOOLS 7.30 | SP015 | 000003
  • J2EE ENGINE CORE TOOLS 7.30 | SP016 | 000004
  • J2EE ENGINE CORE TOOLS 7.30 | SP017 | 000006
  • J2EE ENGINE CORE TOOLS 7.30 | SP018 | 000006
  • J2EE ENGINE CORE TOOLS 7.30 | SP019 | 000007
  • J2EE ENGINE CORE TOOLS 7.30 | SP020 | 000004
  • J2EE ENGINE CORE TOOLS 7.30 | SP021 | 000000
  • J2EE ENGINE CORE TOOLS 7.31 | SP021 | 000005

Affected component

    BC-JAS-COR-RMT
    RMI, P4, CORBA, IIOP

CVSS

Score: 5.8
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2896025

TAGS

#IIOP
#SSRF
#port-scanning
#&160-Server-Side-Request-Forgery
#Information-exposure
#&160-CVE-2020-6282

More to explorer

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.