what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 22 of 22 RSS Feed

Files from Pablo Artuso

First Active2015-09-29
Last Active2021-10-22
SAP JAVA NetWeaver System Connections XML Injection
Posted Oct 22, 2021
Authored by Pablo Artuso | Site onapsis.com

The Communication Profiles functionality provided within SAP JAVA NetWeaver suffers from an XML external entity injection vulnerability.

tags | advisory, java
advisories | CVE-2021-27635
SHA-256 | 148727acfbb4a8a75ea11ebaf68ed2fcc427fa652ac0cb1a7e2f15ae72c6fc66
SAP Solution Manager 7.20 Missing Authorization
Posted Jun 15, 2021
Authored by Nahuel D. Sanchez, Pablo Artuso, Yvan Genuer | Site onapsis.com

Due to a missing authorization check in the SAP Solution Manager version 7.20 LM-SERVICE component, a remote authenticated attacker could be able to execute privileged actions in the affected system, including the execution of operating system commands.

tags | advisory, remote
advisories | CVE-2020-6207
SHA-256 | ad2a546198819c5e3808faa124d00d50475caa98031463ff99dd70806f19a4fd
SAP Solution Manager 7.2 Missing Authorization
Posted Jun 15, 2021
Authored by Pablo Artuso, Gonzalo Roisman | Site onapsis.com

Any authenticated user of the SAP Solution Manager version 7.2 is able to craft, upload, and execute EEM scripts on the SMDAgents affecting its integrity, confidentiality and availability.

tags | advisory
advisories | CVE-2020-26830
SHA-256 | bdc7e6c1e337b3a9375a591f67ba31840609fc29cc4d04938ddbb01ed4b453aa
SAP Solution Manager 7.2 File Disclosure / Denial Of Service
Posted Jun 15, 2021
Authored by Pablo Artuso, Gonzalo Roisman | Site onapsis.com

The End-User Experience Monitoring (EEM) application, part of the SAP Solution Manager version 7.2, is vulnerable to path traversal. As a consequence, an unauthorized attacker would be able to read sensitive OS files and affect the availability of the EEM robots connected to the SolMan.

tags | advisory
advisories | CVE-2020-26837
SHA-256 | e7df5522b5218db217d73908552d4067a8c0fedc1d3ce58d9455d1d4c14f7d01
SAP Solution Manager 7.2 Remote Command Execution
Posted Mar 26, 2021
Authored by Dmitry Chastuhin, Pablo Artuso, Vladimir Ivanov, Yvan Genuer | Site metasploit.com

This Metasploit module exploits the CVE-2020-6207 vulnerability within the SAP EEM servlet of SAP Solution Manager (SolMan) running version 7.2. The vulnerability occurs due to missing authentication checks when submitting a SOAP request to the /EemAdminService/EemAdmin page to get information about connected SMDAgents allowing an attacker to send HTTP requests (SSRF) and execute OS commands on the connected SMDAgent. Works stable in connected SMDAgent with Java version 1.8. Successful exploitation will allow unauthenticated remote attackers to get a reverse shell from connected to the SolMan agent as the user under which it runs SMDAgent service, which is usually daaadm.

tags | exploit, java, remote, web, shell
advisories | CVE-2020-6207
SHA-256 | 0d5122d6fb0ba7f681b7229fc5c197780b51710c6395404115ad8686072b2b08
SAP Netweaver 7.40 SP 12 SCTC_REFRESH_CONFIG_CTC OS Command Injection
Posted Oct 12, 2016
Authored by Pablo Artuso | Site onapsis.com

SAP Netweaver version 7.40 SP 12 suffers from an OS command injection vulnerability in SCTC_REFRESH_CONFIG_CTC.

tags | advisory
advisories | CVE-2016-7435
SHA-256 | 687b1abdf061c25448d8078207267121d66fc61153b0c01ebfb48546e7fe3ab3
SAP Netweaver 7.40 SP 12 SCTC_REORG_SPOOL OS Command Injection
Posted Oct 11, 2016
Authored by Pablo Artuso | Site onapsis.com

SAP Netweaver version 7.40 SP 12 suffers from an OS command injection vulnerability in SCTC_REORG_SPOOL.

tags | advisory
advisories | CVE-2016-7435
SHA-256 | 1517d473275190d714f68c8e5b64ce52162f23de86d95e76ba101651b720bb43
SAP Netweaver 7.40 SP 12 SCTC_TMS_MAINTAIN_ALOG OS Command Injection
Posted Oct 11, 2016
Authored by Pablo Artuso | Site onapsis.com

SAP Netweaver version 7.40 SP 12 suffers from an OS command injection vulnerability in SCTC_TMS_MAINTAIN_ALOG.

tags | advisory
advisories | CVE-2016-7435
SHA-256 | 5b5b36310db340722cc3361ec4f659c8cd7c00bbaa4b49e34fec23b994713be0
SAP Netweaver 7.40 SP 12 SCTC_REFRESH_IMPORT_USR_CLNT OS Command Injection
Posted Oct 11, 2016
Authored by Pablo Artuso | Site onapsis.com

SAP Netweaver version 7.40 SP 12 suffers from an OS command injection vulnerability in SCTC_REFRESH_IMPORT_USR_CLNT.

tags | advisory
advisories | CVE-2016-7435
SHA-256 | a4de11bcf1661481197db31f9b2b638350c10d8d54f02b10699db0167d5fa303
SAPCRYPTOLIB 5.555.38 Missing Signature Check
Posted Oct 11, 2016
Authored by Fernando Russ, Sergio Abraham, Pablo Artuso | Site onapsis.com

SAPCRYPTOLIB version 5.555.38 suffers from a missing signature check in its DSA algorithm.

tags | advisory
advisories | CVE-2016-4407
SHA-256 | c57e938e01fd374e72b21d0aa73cc8d0c2ca106f33d2addda4e763f24c2e5a95
SAP Netweaver 7.40 SP 12 SCTC_REFRESH_IMPORT_USR_CLNT OS Command Injection
Posted Oct 11, 2016
Authored by Pablo Artuso | Site onapsis.com

SAP Netweaver version 7.40 SP 12 suffers from an OS command injection vulnerability in SCTC_REFRESH_IMPORT_USR_CLNT.

tags | advisory
advisories | CVE-2016-7435
SHA-256 | a8c367bdf4221ca8854b79fe4ceb7e4596e9d9cda855b6f8a1e5f94bbcae970e
SAP Netweaver 7.40 SP 12 PREPARE_CHECK_CAPACITY OS Command Injection
Posted Oct 11, 2016
Authored by Pablo Artuso | Site onapsis.com

SAP Netweaver version 7.40 SP 12 suffers from an OS command injection vulnerability in PREPARE_CHECK_CAPACITY.

tags | advisory
advisories | CVE-2016-7435
SHA-256 | f3adb601ddc92854728dd2ee8a7942701a0cd93b9ae01ead9009fb048194fcad
SAP Netweaver 7.40 SP 12 SCTC_TMS_MAINTAIN_ALOG Command Injection
Posted Oct 3, 2016
Authored by Pablo Artuso | Site onapsis.com

The SAP Netweaver version 7.40 SP 12 SCTC_TMS_MAINTAIN_ALOG function does not correctly sanitize variables used when executing CALL 'SYSTEM' statement, allowing an attacker, with particular privileges, to execute any arbitrary OS command.

tags | exploit, arbitrary
advisories | CVE-2016-7435
SHA-256 | cdea10037f25f37e68dadc3dd2a5c0d0f27caaca32899c47a4e16ddc8f3b72eb
SAP Netweaver 7.40 SP 12 SCTC_REFRESH_CHECK_ENV Command Injection
Posted Oct 3, 2016
Authored by Pablo Artuso | Site onapsis.com

The SAP Netweaver version 7.40 SP 12 SCTC_REFRESH_CHECK_ENV function does not correctly sanitize variables used when executing CALL 'SYSTEM' statement, allowing an attacker, with particular privileges, to execute any arbitrary OS command.

tags | exploit, arbitrary
advisories | CVE-2016-7435
SHA-256 | b35e9f6613d4f1f23468ca6d75fc9ed768d97653f4622f0c9116590ea888b4f4
SAP Netweaver 7.40 SP 12 SCTC_REFRESH_EXPORT_TAB_COMP Command Injection
Posted Oct 3, 2016
Authored by Pablo Artuso | Site onapsis.com

The SAP Netweaver version 7.40 SP 12 SCTC_REFRESH_EXPORT_TAB_COMP function does not correctly sanitize variables used when executing CALL 'SYSTEM' statement, allowing an attacker, with particular privileges, to execute any arbitrary OS command.

tags | exploit, arbitrary
advisories | CVE-2016-7435
SHA-256 | 48c0424ccdff8795c1c8e34571da47df3e36d4472a09787da490e76fa363125c
SAP HANA DB 1.00.091.00.1418659308 Information Disclosure
Posted Aug 20, 2016
Authored by Pablo Artuso, Nahuel Sanchez | Site onapsis.com

SAP HANA DB version 1.00.091.00.1418659308 suffers from a user information disclosure vulnerability.

tags | advisory, info disclosure
advisories | CVE-2016-6145
SHA-256 | bdc9caa13cd84ad00e89d70d09818e47227a940de378774fee051e8ed6f20745
SAP HANA DB 1.00.73.00.389160 SYSTEM User Brute Force
Posted Aug 20, 2016
Authored by Pablo Artuso | Site onapsis.com

SAP HANA DB version 1.00.73.00.389160 fails to institute any brute force protections for gaining access to the SYSTEM user.

tags | advisory
advisories | CVE-2016-6144
SHA-256 | e54c00ad538a9ab4bb746b89bec5d3d9f413b27ed333de41b4692b06ad183cd9
SAP HANA 1.00.091.00.1418659308 Information Disclosure
Posted Aug 19, 2016
Authored by Fernando Russ, Pablo Artuso, Nahuel Sanchez | Site onapsis.com

SAP HANA version 1.00.091.00.1418659308 suffers from a get topology information disclosure vulnerability.

tags | advisory, info disclosure
advisories | CVE-2016-3639
SHA-256 | e75c9fed09b354564d28969a1389e8b9410fd2173c6b155ffb2381ac96e43e93
SAP HANA setTraceLevelsForXsApps SQL Injection
Posted Sep 29, 2015
Authored by Pablo Artuso | Site onapsis.com

Onapsis Security Advisory - SAP HANA suffers from a remote SQL injection vulnerability in the setTraceLevelsForXsApps function. By exploiting this vulnerability an attacker could change configuration settings in the HANA system, affecting the integrity of the data stored and possibly turning the platform unavailable to other users, who won't be able to perform their assigned business operations.

tags | advisory, remote, sql injection
SHA-256 | 7869861a8cf7d5ac351d96a4bde8a820fc9cf69a49a6804cb69e0ab966bc97ce
SAP HANA test-net.xsjs Code Injection
Posted Sep 29, 2015
Authored by Nahuel D. Sanchez, Pablo Artuso | Site onapsis.com

Onapsis Security Advisory - SAP HANA suffers from an XSJS code injection vulnerability in test-net.xsjs. By exploiting this vulnerability a remote authenticated attacker would be able to partially compromise the SAP system as well as all the information processed and stored in the HANA system.

tags | advisory, remote
SHA-256 | 536c2f5bd066d0dd00d1598734d6f710d8be3e982bbd78bef9d75361bc5754eb
SAP HANA _newUser SQL Injection
Posted Sep 29, 2015
Authored by Pablo Artuso | Site onapsis.com

Onapsis Security Advisory - The SAP HANA _newUser function suffers from a remote SQL injection vulnerability. By exploiting this vulnerability an attacker could modify information related to users of the HANA system, affecting the integrity of the data stored.

tags | advisory, remote, sql injection
SHA-256 | f3b215fc645ed5adb73a39c5c8db51b7f63d88844aaeb6ee126baf1e0fc6ffda
SAP HANA _modifyUser SQL Injection
Posted Sep 29, 2015
Authored by Pablo Artuso | Site onapsis.com

Onapsis Security Advisory - The SAP HANA _modifyUser function suffers from a remote SQL injection vulnerability. By exploiting this vulnerability an attacker could modify information related to users of the HANA system, affecting the integrity of the data stored.

tags | advisory, remote, sql injection
SHA-256 | 2bf8dc1f0018c72dd7928ea2e39a57b4c7a243e7a5cde3f12425bfe6876cac15
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close