Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SAP SE | SAP NetWeaver AS JAVA (LM Configuration Wizard) | < 7.30 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability) | https://github.com/chipik/SAP_RECON | POC Details |
| 2 | PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https://github.com/rapid7/metasploit-framework/pull/13852/commits/d1e2c75b3eafa7f62a6aba9fbe6220c8da97baa8 This PoC only create user with unauthentication permission and no more administrator permission set. This project is created only for educational purposes and cannot be used for law violation or personal gain. The author of this project is not responsible for any possible harm caused by the materials of this project. Original finding: CVE-2020-6287: Pablo Artuso CVE-2020-6286: Yvan 'iggy' G. Usage: python sap-CVE-2020-6287-add-user.py <HTTP(s)://IP:Port | https://github.com/duc-nt/CVE-2020-6287-exploit | POC Details |
| 3 | None | https://github.com/Onapsis/CVE-2020-6287_RECON-scanner | POC Details |
| 4 | sap netweaver portal add user administrator | https://github.com/ynsmroztas/CVE-2020-6287-Sap-Add-User | POC Details |
| 5 | [CVE-2020-6287] SAP NetWeaver AS JAVA (LM Configuration Wizard) Authentication Bypass (Create Simple & Administrator Java User) | https://github.com/murataydemir/CVE-2020-6287 | POC Details |
| 6 | Checker help to verify created account or find it's mandat | https://github.com/qmakake/SAP_CVE-2020-6287_find_mandate | POC Details |
| 7 | Automated Exploit for CVE-2020-6287 | https://github.com/dylvie/CVE-2020-6287_SAP-NetWeaver-bypass-auth | POC Details |
| 8 | A simple workflow that runs all SAP NetWaver related nuclei templates on a given target. | https://github.com/projectdiscovery/nuclei-templates/blob/main/workflows/sap-netweaver-workflow.yaml | POC Details |
| 9 | SAP NetWeaver AS JAVA (LM Configuration Wizard), versions 7.30, 7.31, 7.40, 7.50, does not perform an authentication check which allows an attacker without prior authentication to execute configuration tasks to perform critical actions against the SAP Java system, including the ability to create an administrative user, and therefore compromising Confidentiality, Integrity and Availability of the system. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-6287.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2020-6267 | SAP Disclosure Management 跨站脚本漏洞 | |
| CVE-2020-6276 | SAP Business Objects Business Intelligence Platform 跨站脚本漏洞 | |
| CVE-2020-6278 | SAP Business Objects Business Intelligence Platform 跨站脚本漏洞 | |
| CVE-2020-6280 | SAP NetWeaver AS ABAP和ABAP Platform 信息泄露漏洞 | |
| CVE-2020-6281 | SAP Business Objects Business Intelligence Platform 跨站脚本漏洞 | |
| CVE-2020-6282 | SAP NetWeaver AS JAVA 代码问题漏洞 | |
| CVE-2020-6285 | SAP NetWeaver-XML Toolkit for JAVA 信息泄露漏洞 | |
| CVE-2020-6286 | SAP NetWeaver AS JAVA 路径遍历漏洞 | |
| CVE-2020-6289 | SAP Disclosure Management 跨站请求伪造漏洞 | |
| CVE-2020-6290 | SAP Disclosure Management 授权问题漏洞 | |
| CVE-2020-6291 | SAP Disclosure Management 代码问题漏洞 | |
| CVE-2020-6292 | SAP Disclosure Management 代码问题漏洞 |
No comments yet