Application: SAP NetWeaver J2EE
Versions Affected: SAP NetWeaver
Vendor URL: http://www.sap.com
Bugs: Security Bypass
Vendor response: 26.09.2013
Date of Public Advisory: 09.07.2013
Reference: SAP Security Note 1831053
Author: Dmitry Chastukhin (ERPScan)
When a developer deploys a servlet, he maps servlet to the server role in the J2EE engine-specific deployment descriptor.
If this mapping is wrong, users can get access to dangerous servlet functions.
By exploiting this vulnerability, an internal or external attacker will be able to escalate their privileges. With the help of this access, it is possible to obtain sensitive technical and business-related information stored in the vulnerable SAP system.