Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Invoker Servlet Fix for IS-M/AMC, SAP security note 1535301

Description

Via the so called Invoker Servlet feature, HTTP clients able to invoke arbitrary servlets even if not defined in the web.xml file of the application. Each web application gets a default servlet mapping “/servlet/*” which is mapped to Invoker Servlet provided by the web container. This servlet may load an arbitrary servlet by servlet name or servlet class. As a result, all requests in the following pattern: “/<context-root>/servlet/<servlet-name-or-class>” lead to invocation of the servlet <servlet-name-or-class>. Via this feature, application servlets may be invoked by end users although the application is not willing to provide them (security attacs). For example if a web application contains a buggy servlet but hasn’t declared it into its web.xml file (because it is buggy!), the clients are still able to invoke it. In addition by default there is no authentication needed in order to invoke these servlets. The Invoker Servlet will be disabled by NetWeaver.

Available fix and Supported packages

  • ISM-AMC-WB | 2.0 | 2.0
  • ISM-AMC-WB | 3.0 | 3.0
  • ISM-AMC-WE | 3.0 | 3.0

Affected component

    IS-M-AMC
    Advertising Management Classified

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1535301

TAGS

#Security
#AMC
#Invoker-Servlet
#servlet-mapping

Explore More

RedRays AI for ABAP Code Security

Empowering Secure, Efficient, and Compliant SAP ABAP Development—in Real Time and Without Data Retention In today’s rapidly evolving business landscape, organizations increasingly

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.