This Metasploit module exploits the CVE-2020-6207 vulnerability within the SAP EEM servlet of SAP Solution Manager (SolMan) running version 7.2. The vulnerability occurs due to missing authentication checks when submitting a SOAP request to the /EemAdminService/EemAdmin page to get information about connected SMDAgents allowing an attacker to send HTTP requests (SSRF) and execute OS commands on the connected SMDAgent. Works stable in connected SMDAgent with Java version 1.8. Successful exploitation will allow unauthenticated remote attackers to get a reverse shell from connected to the SolMan agent as the user under which it runs SMDAgent service, which is usually daaadm.
0d5122d6fb0ba7f681b7229fc5c197780b51710c6395404115ad8686072b2b08
Oracle Hospitality Simphony (MICROS) versions 2.7 through 2.9 suffer from a directory traversal vulnerability.
6570490d9880f31aeb7fdbff964f9a9005e9983ee73dd712856ca52a42a37078
Oracle E-Business Suite version 12.2.3 suffers from a remote SQL injection vulnerability.
fdf11a3dbf17bfa298933d15dd12fc9860d85cbb06c02b150b5ba4663131b3fa
SAP MII version 15.0 suffers from a directory traversal vulnerability.
3d47db897ab0c13589383048d607feb517d5192140c1fe1fec6f7b1c71e770f9
SAP has released the monthly critical patch update for August 2015. This patch update closes 22 vulnerabilities in SAP products, 15 have high priority, some of them belong to the SAP HANA security area. The most popular vulnerability is cross site scripting.
ee31bc13be4242371858e63b399fe7e6e376803421f553b15b566f75b404d801
This Metasploit module allows remote code execution via operating system commands through the SAP ConfigServlet without any authentication. This Metasploit module has been tested successfully with SAP NetWeaver 7.00 and 7.01 on Windows Server 2008 R2.
62e0a4607ddec7e5f1da4c772ef23ba8583944002abf5e96e995e6da403c5361
This Metasploit module allows execution of operating system commands through the SAP ConfigServlet without any authentication.
bd22164e93c481f2adee97758ca447db0d47658f7a4544609432a32799d8b8d3
SAP Crystal Report Server 2008 suffers from a cross site scripting vulnerability.
5d317ae48eb94648a5577e2a7ecbcc8a552c5f1dd2741d04fd386f0cc7d2d72f
Multiple cross site scripting vulnerabilities have been discovered in the PerformanceManagement application module in SAP Crystal Reports Server 2008.
51f030365393b65a3456ecb53c5f5e39b1847584605dc54abbe2141bcba154a8
Insecure practices where found in the library scriptinghelpers.dll from SAP Crystal Report Server 2008. An attacker could construct a html-page containing a call insecure functions.
29926d9586641116eb339bef4f9eb33eae55dfcd24cd7eb87a02a1fbbd8d02b7
SAP Crystal Report Server 2008 suffers from a directory traversal vulnerability.
5bebb637d7e51e2a0d9d84df5f7b28a6a33af536f8f0ea29e3bf80b431a7af0a
SAP Crystal Report Server 2008 suffers from a cross site scripting vulnerability.
5bb33dcb865e51328736f78871bcaf01a2e663aac535fd2aa2d1af81cdfe13cd