关联漏洞
标题:
SAP NetWeaver AS JAVA 授权问题漏洞
(CVE-2020-6287)
描述:SAP Netweaver是德国思爱普(SAP)公司的一套面向服务的集成化应用平台。该平台主要为SAP应用程序提供开发和运行环境。SAP NetWeaver Application Server(AS)Java是一款运行于NetWeaver中且基于Java编程语言的应用服务器。 SAP NetWeaver AS JAVA (LM Configuration Wizard)中存在授权问题漏洞,该漏洞源于程序未执行身份验证检查。攻击者可利用该漏洞执行配置任务,在SAP Java系统上执行重要操作,包括创建管理
描述
PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https://github.com/rapid7/metasploit-framework/pull/13852/commits/d1e2c75b3eafa7f62a6aba9fbe6220c8da97baa8 This PoC only create user with unauthentication permission and no more administrator permission set. This project is created only for educational purposes and cannot be used for law violation or personal gain. The author of this project is not responsible for any possible harm caused by the materials of this project. Original finding: CVE-2020-6287: Pablo Artuso CVE-2020-6286: Yvan 'iggy' G. Usage: python sap-CVE-2020-6287-add-user.py <HTTP(s)://IP:Port
介绍
# CVE-2020-6287-exploit
### PoC for CVE-2020-6287
### The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https://github.com/rapid7/metasploit-framework/pull/13852/commits/d1e2c75b3eafa7f62a6aba9fbe6220c8da97baa8
### This PoC only create user with unauthenticated permission and no more administrator permission set.
### This project is created only for educational purposes and cannot be used for law violation or personal gain.
### The author of this project is not responsible for any possible harm caused by the materials of this project.
### Original finding: CVE-2020-6287: Pablo Artuso. CVE-2020-6286: Yvan 'iggy' G.
### Usage: python sap-CVE-2020-6287-add-user.py HTTP/S://IP:Port USERNAME_FOR_CREATE PASSWD
## Demo
` Simple:`
<img src="https://pbs.twimg.com/media/EdZA41PUEAAcE8Q?format=png&name=large">
` Advanced:`
<img src="https://pbs.twimg.com/media/Eda76DnUEAIMJSD?format=png&name=large">
文件快照
[4.0K] /data/pocs/9a179d6f20bd420c9d56282f1d2c61f85daf20d0
├── [1007] README.md
└── [2.6K] sap-CVE-2020-6287-add-user.py
0 directories, 2 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。