Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-6287 PoC — SAP NetWeaver AS JAVA 授权问题漏洞

Source
Associated Vulnerability
Title:SAP NetWeaver AS JAVA 授权问题漏洞 (CVE-2020-6287)
Description:SAP Netweaver是德国思爱普(SAP)公司的一套面向服务的集成化应用平台。该平台主要为SAP应用程序提供开发和运行环境。SAP NetWeaver Application Server(AS)Java是一款运行于NetWeaver中且基于Java编程语言的应用服务器。 SAP NetWeaver AS JAVA (LM Configuration Wizard)中存在授权问题漏洞,该漏洞源于程序未执行身份验证检查。攻击者可利用该漏洞执行配置任务,在SAP Java系统上执行重要操作,包括创建管理
Description
Checker help to verify created account or find it's mandat
Readme
# SAP_CVE-2020-6287_find_mandate
Checker help to verify created account or find it's mandat

The script allows you to check whether the account was created when using the exploit RECON.py or find the mandate of the created account 

## Exploit:

   https://github.com/chipik/SAP_RECON
      
   
## Quick start:

chmod +x 

./checker_CVE-2020-6287.sh \<start mndt> \<stop mndt> \<ip> \<port> \<login> \<password>
```
    - <start mndt> : first value of mandate for iterate (000-999) useful for me 000,001,002,003,004,005,006,007,008,009,066,100,150,200,500,520
    - <stop mndt> : last value for iterate
    - <ip> : IP address of vulnerable host
    - <port> : endpoint of vulnerable service
    - <login> : login created with RECON.py
    - <password> : password created with RECON.py
```    
### Helpfull oneliner:

for i in {000,001,002,003,004,005,006,007,008,009,066,100,150,200,500,520}; do ./checker_CVE-2020-6287.sh ${i} ${i} \<ip> \<port> \<login> \<password>;done

![My Image](Screen.png)

The first value is a mandate. Code 302 says, the user is exist.
File Snapshot

[4.0K] /data/pocs/12607ca2d084813dac2577c69a123502ac688205 ├── [1.7K] checker_CVE-2020-6287.sh ├── [1.0K] README.md └── [4.2K] Screen.png 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.