New critical vulnerabilities in SAP application server were published by ERPScan researchers. Using these vulnerabilities an attacker can cause remote denial of service attack for example for sabotage of a rival company. Every attacker can execute these attacks by sending a malicious request to any SAP server located on the Internet or on the corporate subnet. One attack can be used without authentication and another one needs working credentials but an attacker can use well-known default passwords.
The vulnerabilities are very critical due to the fact that any Internet user can find SAP servers using simple Google hacking techniques and remotely disable any SAP server which can pose significant business risk and monetary loss for a company operating on the Internet with clients using SAP Software. Users are to upgrade these systems as soon as possible using recommendations from SAP Security Notes 1484097 and 1469549 — commented Alexander Polyakov, Head of ERPScan.
Technical details of publications are accessible in DSecRG Advisories:
[ERPSCAN-10-006] SAP Netweaver MMR — Denail of Service
[ERPSCAN-10-005] SAP Netweaver XRFC — Stack Overflow
[ERPSCAN-09-056] SAP Netweaver SQL Monitors — Multiple XSS