exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 100 RSS Feed

Files

SAP NetWeaver SPML Cross Site Request Forgery
Posted Nov 17, 2011
Authored by Sh2kerr

The SAP NetWeaver SPML service suffers from a cross site request forgery vulnerability.

tags | advisory, csrf
SHA-256 | 322ab3a2b0d5f55c5b57691f980918122aa961043519cd3ac848bdaa88e9ca1b

Related Files

SAP SOAP RFC PFL_CHECK_OS_FILE_EXISTENCE File Existence Check
Posted Sep 1, 2024
Authored by nmonkee, lexey Tyurin | Site metasploit.com

This Metasploit module abuses the SAP NetWeaver PFL_CHECK_OS_FILE_EXISTENCE function, on the SAP SOAP RFC Service, to check for files existence on the remote file system. The module can also be used to capture SMB hashes by using a fake SMB share as FILEPATH.

tags | exploit, remote
SHA-256 | 9d5f46cbc7660de1aed08bce90727085f54a370aa1d41e6c542210bc5a436973
SAP SOAP RFC EPS_GET_DIRECTORY_LISTING Directories Information Disclosure
Posted Sep 1, 2024
Authored by nmonkee | Site metasploit.com

This Metasploit module abuses the SAP NetWeaver EPS_GET_DIRECTORY_LISTING function, on the SAP SOAP RFC Service, to check for remote directory existence and get the number of entries on it. The module can also be used to capture SMB hashes by using a fake SMB share as DIR.

tags | exploit, remote
SHA-256 | e9446350eea1081a54d135daacf2fb0e7ff1aadcd595676db4b0228d64da75d9
SAP SOAP EPS_DELETE_FILE File Deletion
Posted Aug 31, 2024
Authored by Alexey Sintsov, nmonkee | Site metasploit.com

This Metasploit module abuses the SAP NetWeaver EPS_DELETE_FILE function, on the SAP SOAP RFC Service, to delete arbitrary files on the remote file system. The module can also be used to capture SMB hashes by using a fake SMB share as DIRNAME.

tags | exploit, remote, arbitrary
SHA-256 | dd8fea54335c24c4b123e867b2f7f6799e65ed7f1293added0b5dc7555c7b9a1
SAP NetWeaver ABAP IGS Memory Corruption
Posted Oct 22, 2021
Authored by Yvan Genuer | Site onapsis.com

The SAP NetWeaver ABAP IGS service suffers from multiple memory corruption vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2021-27620, CVE-2021-27622, CVE-2021-27624, CVE-2021-27625, CVE-2021-27626, CVE-2021-27627
SHA-256 | 2d1f0734303783a8b47a886f91b23670d4395d5d4ed4501f6e4af6001b97b2b7
SAP NetWeaver ABAP Gateway Memory Corruption
Posted Oct 22, 2021
Authored by Yvan Genuer | Site onapsis.com

The SAP NetWeaver ABAP Gateway service suffers from multiple memory corruption vulnerabilities.

tags | advisory, vulnerability
advisories | CVE-2021-27597, CVE-2021-27633, CVE-2021-27634
SHA-256 | da1fec63d0f864232e684c79171e0e2cc4a5296c2ce6bd0702518810eabac2ea
SAP Netweaver 7.40 SP 12 SCTC_TMS_MAINTAIN_ALOG Command Injection
Posted Oct 3, 2016
Authored by Pablo Artuso | Site onapsis.com

The SAP Netweaver version 7.40 SP 12 SCTC_TMS_MAINTAIN_ALOG function does not correctly sanitize variables used when executing CALL 'SYSTEM' statement, allowing an attacker, with particular privileges, to execute any arbitrary OS command.

tags | exploit, arbitrary
advisories | CVE-2016-7435
SHA-256 | cdea10037f25f37e68dadc3dd2a5c0d0f27caaca32899c47a4e16ddc8f3b72eb
SAP Netweaver 7.40 SP 12 SCTC_REFRESH_CHECK_ENV Command Injection
Posted Oct 3, 2016
Authored by Pablo Artuso | Site onapsis.com

The SAP Netweaver version 7.40 SP 12 SCTC_REFRESH_CHECK_ENV function does not correctly sanitize variables used when executing CALL 'SYSTEM' statement, allowing an attacker, with particular privileges, to execute any arbitrary OS command.

tags | exploit, arbitrary
advisories | CVE-2016-7435
SHA-256 | b35e9f6613d4f1f23468ca6d75fc9ed768d97653f4622f0c9116590ea888b4f4
SAP Netweaver 7.40 SP 12 SCTC_REFRESH_EXPORT_TAB_COMP Command Injection
Posted Oct 3, 2016
Authored by Pablo Artuso | Site onapsis.com

The SAP Netweaver version 7.40 SP 12 SCTC_REFRESH_EXPORT_TAB_COMP function does not correctly sanitize variables used when executing CALL 'SYSTEM' statement, allowing an attacker, with particular privileges, to execute any arbitrary OS command.

tags | exploit, arbitrary
advisories | CVE-2016-7435
SHA-256 | 48c0424ccdff8795c1c8e34571da47df3e36d4472a09787da490e76fa363125c
SAP SOAP RFC SXPG_CALL_SYSTEM Remote Command Execution
Posted May 9, 2013
Authored by nmonkee | Site metasploit.com

This Metasploit module abuses the SAP NetWeaver SXPG_CALL_SYSTEM function, on the SAP SOAP RFC Service, to execute remote commands. This Metasploit module needs SAP credentials with privileges to use the /sap/bc/soap/rfc in order to work. The module has been tested successfully on Windows 2008 64 bits and Linux 64 bits platforms.

tags | exploit, remote
systems | linux, windows
SHA-256 | 07e4fa901be9cc50c8930727a69a8c8e30098c5150d37c5a93fa5928c0123236
SAP SOAP RFC SXPG_COMMAND_EXECUTE Remote Command Execution
Posted May 9, 2013
Authored by nmonkee | Site metasploit.com

This Metasploit module abuses the SAP NetWeaver SXPG_COMMAND_EXECUTE function, on the SAP SOAP RFC Service, to execute remote commands. This Metasploit module needs SAP credentials with privileges to use the /sap/bc/soap/rfc in order to work. The module has been tested successfully on Windows 2008 64 bits and Linux 64 bits platforms.

tags | exploit, remote
systems | linux, windows
SHA-256 | 9c4b5e90a96b549626431074b175b223177580d1d90db57236152e6e60113583
SAP NetWeaver Dispatcher DiagTraceR3Info Buffer Overflow
Posted Sep 3, 2012
Authored by juan vazquez, Martin Gallo | Site metasploit.com

This Metasploit module exploits a stack buffer overflow in the SAP NetWeaver Dispatcher service. The overflow occurs in the DiagTraceR3Info() function and allows a remote attacker to execute arbitrary code by supplying a special crafted Diag packet. The Dispatcher service is only vulnerable if the Developer Traces have been configured at levels 2 or 3. The module has been successfully tested on SAP Netweaver 7.0 EHP2 SP6 over Windows XP SP3 and Windows 2003 SP2 (DEP bypass).

tags | exploit, remote, overflow, arbitrary
systems | windows
advisories | CVE-2012-2611, OSVDB-81759
SHA-256 | df2e94bf3f16b9b94127f76497e9d8f082577bd02bc6dd1ff0c5913c7b9ff7fa
SAP NetWeaver Virus Scan Cross Site Scripting
Posted Nov 17, 2011
Authored by Dmitriy Evdokimov

The SAP NetWeaver Virus Scan interface suffers from multiple cross site scripting vulnerabilities.

tags | advisory, vulnerability, virus, xss
SHA-256 | bb8285b3a50293e1b7955490ff1a6f95c2a536a27d3d98b985e8678a317a3799
SAP WebAS ITS Mobile Start Service Information Disclosure
Posted Apr 28, 2011
Site onapsis.com

Onapsis Security Advisory - The SAP Web Application Server (WebAS) is the application platform of the SAP NetWeaver, which is the basis for the other NetWeaver components. With the SAP Web Application Server you can implement both server-based and client-based Web applications. It has been detected that the ITS Mobile Start service suffers from input validation vulnerabilities and design weaknesses, which can be exploited to perform XSS and arbitrary redirects attacks.

tags | advisory, web, arbitrary, vulnerability
SHA-256 | 4973dde1444f7ea1451bf61d92f93f460d71a3e5898a4dae972e180aaafefe31
SAP WebAS ITS Mobile Test Service XSS
Posted Apr 28, 2011
Site onapsis.com

Onapsis Security Advisory - The SAP Web Application Server (WebAS) is the application platform of the SAP NetWeaver, which is the basis for the other NetWeaver components. With the SAP Web Application Server you can implement both server-based and client-based Web applications. It has been detected that the ITS Mobile Test service suffers from input validation vulnerabilities and design weaknesses, which can be exploited to perform XSS and arbitrary redirects attacks.

tags | advisory, web, arbitrary, vulnerability
SHA-256 | b1a16e8fafc41fd2fd523be4fe06a2088738ea8be3c1a1f316e68006cd95226d
SAP NetWeaver Integration Directory Cross Site Scripting
Posted Mar 16, 2011
Authored by Sh2kerr, Dmitriy Evdokimov

Multiple cross site scripting vulnerabilities have been discovered in the SAP NetWeaver Integration Directory.

tags | advisory, vulnerability, xss
SHA-256 | 6c1f10b4919499bf8e2eb3a38ba5b4c505670c59ce701c4a2769af93a5d72d82
SAP XRFC 6.40 / 7.00 Stack Overflow
Posted Nov 17, 2010
Authored by Alexey Sintsov

SAP XRFC version 6.40 and 7.00 suffers from a stack overflow vulnerability.

tags | advisory, overflow
SHA-256 | 9b8e7b9a5adb907ede97829d87b64a1087018e9595e7e83781a56c9d2180bf3a
SAP NetWeaver Administrator Panel ECC 6.0 Cross Site Scripting
Posted Nov 17, 2010
Authored by Sh2kerr, Alexey Troshichev | Site dsecrg.com

The SAP NetWeaver administrator panel from ECC version 6.0 suffers from cross site scripting vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 3d805721f30788cc734b4cca6025ed61f899f4240facd6d677bd99feb4a472b9
Oracle BPEL Console 10.1.3.3.0 Cross Site Scripting
Posted Oct 28, 2010
Authored by Sh2kerr | Site dsecrg.com

Oracle BPEL Console version 10.1.3.3.0 suffers from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2010-3581
SHA-256 | 8b80837fd9c12c060f51e80f3ef5cf3cb1543ef6936db9fd039e3765f60d152d
Oracle BI Publisher HTTP Response Splitting
Posted Oct 28, 2010
Authored by Sh2kerr | Site dsecrg.com

Oracle BI Publisher suffers from a HTTP response splitting vulnerability.

tags | exploit, web
SHA-256 | a16b4a5d2e42764c015a89ca8d14b3e7d1594fc9ccef544177abbde6f3759df3
SAP NetWeaver SLD 6.4 - 7.02 Cross Site Scripting
Posted Jul 23, 2010
Authored by Sh2kerr, Alexey Troshichev | Site dsecrg.com

SAP NetWeaver SLD versions 6.4 through 7.02 suffer from multiple cross site scripting vulnerabilities.

tags | advisory, vulnerability, xss
SHA-256 | 8b641e06e58f7c35d9140a710b83cde908ed39795c6e2eedaaa58b596a3b8385
SAP Netweaver 6.4 - 7.0 Cross Site Scripting
Posted Jul 23, 2010
Authored by Sh2kerr | Site dsecrg.com

SAP Netweaver versions 6.4 through 7.0 suffer from a cross site scripting vulnerability.

tags | exploit, xss
SHA-256 | 3a33cbd84a9db933f995cbae70e001e3a89be10e4fa30b160c720ca941a9066e
IBM BladeCenter Management Module Cross Site Scripting / Directory Traversal
Posted Jul 6, 2010
Authored by Alexey Sintsov | Site dsecrg.com

The IBM BladeCenter Management module suffers from cross site scripting and directory traversal vulnerabilities.

tags | exploit, vulnerability, xss
SHA-256 | 221ec396f78060edb0ef769a38cef5b58e18b6f8c6f38d5188b079e148e40370
VMware Portal 3.1 Cross Site Scripting
Posted May 14, 2010
Authored by Alexey Sintsov

VMware View Portal versions 3.1 and below suffer from a cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2010-1143
SHA-256 | 6ff34d3c4c5414257facf8f8b5cdd2f2fd3e1d2c50b916d0ba65eccf0d979ba0
BladeCenter AMM Denial Of Service
Posted Apr 16, 2010
Authored by Alexey Sintsov

The IBM BladeCenter Management module suffers from a denial of service vulnerability.

tags | exploit, denial of service
SHA-256 | 2fdefac0d8be7e6b47669981826466ac5d6de34aad57eb161e0f1651ff4e02b5
VMware Remote Console Format String
Posted Apr 14, 2010
Authored by Alexey Sintsov | Site dsecrg.com

VMware Remote Console Plug-in can be installed from WEB interface of VMware vSphere. This software contains of ActiveX objects and executable files for remote console of guest OS. VMrc vulnerable to format string attacks. Exploitation of this issue may lead to arbitrary code execution on the system where VMrc is installed.

tags | advisory, remote, web, arbitrary, code execution, activex
advisories | CVE-2009-3732
SHA-256 | 9b7e2d5d9e6d71cece7b4f8e09a5fa1063bb231718082ebea4980540a99db1c7
Page 1 of 4
Back1234Next

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close