Trooper14, Heidelberg
Risks of hosted SAP Environments
Andreas Wiegenstein ( @codeprofiler ) - Xu Jia ( @XuJia7 )
Disclaimer
SAP, R/3, ABAP, SAP GUI, SAP NetWeaver and other SAP products and services mentioned herein as well as their respective logos are trademarks
or registered trademarks of SAP AG in Germany and other countries.
All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves
informational purposes only.
The authors assume no responsibility for errors or omissions in this document. The authors do not warrant the accuracy or completeness of the
information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either
express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement.
The authors shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that
may result from the use of this document. Especially not in hosted environments.
No part of this document may be reproduced without the prior written permission of Virtual Forge GmbH.
© 2014 Virtual Forge GmbH.
2
#SAP
#Security
#Research
CTO at Virtual Forge
SAP Security Researcher, active since 2003
Received Credits from SAP for 66 reported 0-day Vulnerabilities
Speaker at international Conferences
SAP TechEd (US & Europe), BlackHat (Europe), Hack in the Box (Europe)
Troopers (Europe), IT Defense (Europe), RSA (US)
Andreas Wiegenstein
Xu Jia
Security Analyst at Virtual Forge
SAP Security Researcher, active since 2006
Received Credits from SAP for 28 reported 0-day Vulnerabilities
Speaker at international Conferences
Troopers (2013), Sicherheit und Prüfung von SAP Systemen (2012)
Who is SAP?
4
Source:http://www.posters.at/the-simpsons--homer-bier_a34273.html
Why protect SAP Systems?
More than 248,500 companies run SAP
SAP customers…
Transport > 1.1 billion flight passengers per year
Produce > 65% of all TV’s
Produce > 77,000 cars every day
Produce > 52% of all movies
And…
72% of the world-wide beer production depends on companies that run SAP !!!
#Statistics
"There are three kinds of lies: lies, damned lies, and statistics."
Benjamin Disraeli
“Statistics are mendacious truths.”
Lionel Strachey
“Don’t trust statistics you didn’t falsify yourself.”
Unknown
…and now we present
* Based the number of credits per individual researcher involved in an advisory
** Considering only such advisories that were researched at Starbucks on a Friday afternoon in Heidelberg
SAP credits* for
security advisories
(Since 2010)
5 Companies hold 75%
;-)
On SAP Security Notes
Source: https://www.virtualforge.com/de/blog/post/security-research-2013-en.html
Average before 2013: 16%
Average notes/month: 61
Average in 2013: 61%
Average notes/month: 28
Agenda
Motivation
Hosted SAP Application Variant A : Multi-System
Hosted SAP Application Variant B : Single-System
Demo
8
Motivation
Security Incident
Hosted SAP Application Variant A:
Multi-System
SAP Solution Manager
Solution Manager
DEMO
Risks in Multi-System Hosting
SAP Solution Manager (SolMan)
SolMan has a very high attack surface
If SAP Solution Manager falls, all connected systems fall
Many SolMan applications are Web-based
A critical SAP 0day in SolMan can result in access to all
data of all hosted companies
13
Risks in Multi-System Hosting – SolMan on the Internet
Some URL Patterns of SAP Solution Manager
/sap/bc/webdynpro/sap/ags_workcenter
/sap/bc/bsp/sap/ags_rbe_report
/sap/bc/webdynpro/sap/ags_dswp_infra_wc
/sap/bc/webdynpro/sap/ags_work_gui_default_set
14
Hosted SAP Application Variant B:
Single-System
SAP Open SQL is by design implicitly protecting client-specific data.
Risks in Single-System Hosting – Bypassing Client Protection
17
Bypassing OSQL client protection in ABAP programs
Explicit bypass using CLIENT SPECIFIED
Implicit bypass using EXECSQL
Implicit bypass using ADBC
The following Risks exist in Single-System Hosting
18
Any custom ABAP Code can access all data of all hosted
companies
Any SAP 0day that allows cross-client access can result in
access to all data of all hosted companies
-Any ABAP Command Injection Vulnerability
-Any Native SQL Injection Vulnerability
-Any generic Cross-Client Vulnerability
DEM0day
Statistics on Cross-Client Access
20
Custom code performs on average* cross-client accesses
per (in-house) installation
* Survey of 159 SAP Customers (statistics, again)
occurrences of CLIENT SPECIFIED in SAP Standard
76
2000+
CVSS Guide Version 2.0
http://www.first.org
2.1.4. Confidentiality Impact (C)
Partial (P) There is considerable informational disclosure. Access to some system files is possible,
but the attacker does not have control over what is obtained, or the scope of the loss is constrained.
An example is a vulnerability that divulges only certain tables in a database.
Complete (C) There is total information disclosure, resulting in all system files being revealed.
The attacker is able to read all of the system's data (memory, files, etc.)
SAP Note (Patch) related to cross-client read Access
22
1718145 VF Advisory SAP-BACK-13 (generic read Access)
Sent to SAP: 13.02.2012
Patched on: 14.05.2013
Patch time: 451 days
CVSS Rating: 3.5
CVSS Vector: AV:N/AC:M/AU:S/C:P/I:N/A:N
CVSS Guide Version 2.0
http://www.first.org
2.1.5. Integrity Impact (I)
Partial (P) Modification of some system files or information is possible, but the attacker does not have control over
what can be modified, or the scope of what the attacker can affect is limited. For example, system or
application files may be overwritten or modified, but either the attacker has no control over which files
are affected or the attacker can modify files within only a limited context or scope.
Complete (C) There is a total compromise of system integrity. There is a complete loss of system protection,
resulting in the entire system being compromised. The attacker is able to modify any files on the
target system.
CVSS Guide Version 2.0
http://www.first.org
2.1.6 Availability Impact (A)
Partial (P) There is reduced performance or interruptions in resource availability.
An example is a network-based flood attack that permits a limited number of successful connections to an
Internet service.
Complete (C) There is a total shutdown of the affected resource.
The attacker can render the resource completely unavailable.
SAP Note (Patch) related to cross-client write Access
25
1718145 VF Advisory SAP-BACK-12 (generic read Access)
Sent to SAP: 13.02.2012
Patched on: 08.04.2013
Patch time: 415 days
CVSS Rating: 6.0
CVSS Vector: AV:N/AC:M/AU:S/C:P/I:P/A:P
Summary
(No statistics this time)
Secure Hosting Checklist for SAP Customers
27
Does your Hoster install new SAP security notes every month?
How does your Hoster deal with custom Code Security?
How does your Hoster mitigate risks related to Solution
Manager?
Are there penetration tests / security audits performed (by SAP
security experts) on a regular basis?
SAP Security Blog
This Talk as PDF
Thank you for your attention.
Questions ?
@codeprofiler @XuJia7
Now or
later
#ThingsWeFoundWhenPentestingSAP

More Related Content

PPTX
From the Frontline of RASP Adoption
PPTX
Software Development Weaknesses - SecOSdays Sofia, 2019
PPT
Introduction To OWASP
PDF
Waratek overview 2016
PPTX
20160211 OWASP Charlotte RASP
PPT
OWASP Serbia - A6 security misconfiguration
PPTX
Owasp 2017 oveview
PPT
OWASP an Introduction
From the Frontline of RASP Adoption
Software Development Weaknesses - SecOSdays Sofia, 2019
Introduction To OWASP
Waratek overview 2016
20160211 OWASP Charlotte RASP
OWASP Serbia - A6 security misconfiguration
Owasp 2017 oveview
OWASP an Introduction

What's hot (20)

PDF
Owasp and friends
PPTX
Security misconfiguration
PDF
Waratek ISACA Webinar
PDF
A5-Security misconfiguration-OWASP 2013
PPTX
OWASP Top 10 Vulnerabilities 2017- AppTrana
PPSX
Waratek presentation for RANT November 2016
PPTX
OWASP -Top 5 Jagjit
PDF
Technical Architecture of RASP Technology
PDF
Owasp Top 10
PPTX
Web Application Firewall (WAF) DAST/SAST combination
PPTX
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
PDF
Cyber-attacks to SAP Systems
PDF
Athens Owasp workshop Athens Digital Week 2010
PPTX
OWASP Top 10 - 2017 Top 10 web application security risks
PPTX
Alexey Tyurin - HR Hacking — bugs in PeopleSoft
PDF
Incident Response and SAP Systems
PDF
Innovating Faster with Continuous Application Security
PDF
Sap penetration testing_defense_in_depth
PDF
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
Owasp and friends
Security misconfiguration
Waratek ISACA Webinar
A5-Security misconfiguration-OWASP 2013
OWASP Top 10 Vulnerabilities 2017- AppTrana
Waratek presentation for RANT November 2016
OWASP -Top 5 Jagjit
Technical Architecture of RASP Technology
Owasp Top 10
Web Application Firewall (WAF) DAST/SAST combination
OWASP Top 10 2017 rc1 - The Ten Most Critical Web Application Security Risks
Cyber-attacks to SAP Systems
Athens Owasp workshop Athens Digital Week 2010
OWASP Top 10 - 2017 Top 10 web application security risks
Alexey Tyurin - HR Hacking — bugs in PeopleSoft
Incident Response and SAP Systems
Innovating Faster with Continuous Application Security
Sap penetration testing_defense_in_depth
A Holistic View on SAP Security Why Securing Production Systems Is Not Enough
Ad

Viewers also liked (8)

PDF
Uninvited Guests: Why do hackers love our SAP landscapes?
PDF
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
PDF
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
PDF
Is your SAP system vulnerable to cyber attacks?
PDF
How to assess the risks in your SAP systems at the push of a button
PDF
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
PPTX
Stabile und performante Anwendungen für SAP HANA entwickeln
PDF
Die Top 5 Mythen der SAP Sicherheit
Uninvited Guests: Why do hackers love our SAP landscapes?
Case Study: Ensuring the Quality and Security of Custom SAP Applications at t...
Case Study: ABAP Development Life Cycle and Governance at THE GLOBE AND MAIL ...
Is your SAP system vulnerable to cyber attacks?
How to assess the risks in your SAP systems at the push of a button
How Pratt & Whitney Streamlined Their ABAP Security and Quality Code Review P...
Stabile und performante Anwendungen für SAP HANA entwickeln
Die Top 5 Mythen der SAP Sicherheit
Ad

Similar to Risks of Hosted SAP Environments (20)

PDF
Integrating Application Security into a Software Development Process
PDF
Protect Your Customers Data from Cyberattacks
PDF
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
PDF
SAST for JavaScript: A Brief Overview of Commercial Tools
PDF
Deploying Static Application Security Testing on a Large Scale
PPTX
Secure develpment 2014
PDF
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
PPTX
Continuous security: Bringing agility to the secure development lifecycle
PPTX
SAST Code Security Advisor for SAP [Webinar]
PDF
Addressing Web Application Security Vulnerabilities.pdf
PDF
Penetration Testing SAP Systems
PDF
Security asap
PDF
SAP security made easy
PDF
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
PDF
Adobe Flex Development and Backend Integration With BlazeDS
PDF
Accessibility guideline web_dynpro_external_version
PDF
Application Security Management with ThreadFix
PDF
Practical SAP pentesting (B-Sides San Paulo)
PPT
OpenWhisk Introduction
PDF
Practical SAP pentesting workshop (NullCon Goa)
Integrating Application Security into a Software Development Process
Protect Your Customers Data from Cyberattacks
SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis Overview
SAST for JavaScript: A Brief Overview of Commercial Tools
Deploying Static Application Security Testing on a Large Scale
Secure develpment 2014
Security Testing: Myths, Challenges, and Opportunities - Experiences in Integ...
Continuous security: Bringing agility to the secure development lifecycle
SAST Code Security Advisor for SAP [Webinar]
Addressing Web Application Security Vulnerabilities.pdf
Penetration Testing SAP Systems
Security asap
SAP security made easy
Onapsis SAP Forensics: Detecting White-Collar Cyber Crime with SAP Forensics
Adobe Flex Development and Backend Integration With BlazeDS
Accessibility guideline web_dynpro_external_version
Application Security Management with ThreadFix
Practical SAP pentesting (B-Sides San Paulo)
OpenWhisk Introduction
Practical SAP pentesting workshop (NullCon Goa)

More from Virtual Forge (12)

PDF
How the U.S. Department of Defense Secures Its Custom ABAP Code
PDF
SAP HANA Security: New Technology, New Risks
PDF
Develop Stable, High-Performance Applications for SAP HANA
PDF
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
PDF
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
PPTX
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
PDF
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
PPTX
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
PDF
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
PDF
ABAP Code Qualität - Best Practices
PDF
Best Practices for Ensuring SAP ABAP Code Quality and Security
PDF
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...
How the U.S. Department of Defense Secures Its Custom ABAP Code
SAP HANA Security: New Technology, New Risks
Develop Stable, High-Performance Applications for SAP HANA
ABAP Qualitäts-Benchmark: Eine Analyse von über 200 SAP Installationen
Ungebetene Gäste: Warum lieben Hacker aus aller Welt unsere SAP Landschaften?
Case Study: Automated Code Reviews In A Grown SAP Application Landscape At EW...
Case Study: Automatisierte Code Reviews in einer gewachsenen SAP-Applikations...
10 GOLDEN RULES FOR CODING AUTHORIZATION CHECKS IN ABAP
Mobile Trends And The New Threats - Is Your SAP System Vulnerable to Cyber At...
ABAP Code Qualität - Best Practices
Best Practices for Ensuring SAP ABAP Code Quality and Security
Case Study: Automating Code Reviews for Custom SAP ABAP Applications with Vir...

Recently uploaded (20)

PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
Five Habits of High-Impact Board Members
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Architecture types and enterprise applications.pdf
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
Hybrid model detection and classification of lung cancer
PPTX
Modernising the Digital Integration Hub
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
August Patch Tuesday
PPT
What is a Computer? Input Devices /output devices
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Chapter 5: Probability Theory and Statistics
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
CloudStack 4.21: First Look Webinar slides
1 - Historical Antecedents, Social Consideration.pdf
STKI Israel Market Study 2025 version august
Five Habits of High-Impact Board Members
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Architecture types and enterprise applications.pdf
Developing a website for English-speaking practice to English as a foreign la...
Hybrid model detection and classification of lung cancer
Modernising the Digital Integration Hub
Web Crawler for Trend Tracking Gen Z Insights.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Univ-Connecticut-ChatGPT-Presentaion.pdf
Final SEM Unit 1 for mit wpu at pune .pptx
DP Operators-handbook-extract for the Mautical Institute
August Patch Tuesday
What is a Computer? Input Devices /output devices
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

Risks of Hosted SAP Environments

  • 1. Trooper14, Heidelberg Risks of hosted SAP Environments Andreas Wiegenstein ( @codeprofiler ) - Xu Jia ( @XuJia7 )
  • 2. Disclaimer SAP, R/3, ABAP, SAP GUI, SAP NetWeaver and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. The authors assume no responsibility for errors or omissions in this document. The authors do not warrant the accuracy or completeness of the information, text, graphics, links, or other items contained within this material. This document is provided without a warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, or non-infringement. The authors shall have no liability for damages of any kind including without limitation direct, special, indirect, or consequential damages that may result from the use of this document. Especially not in hosted environments. No part of this document may be reproduced without the prior written permission of Virtual Forge GmbH. © 2014 Virtual Forge GmbH. 2
  • 3. #SAP #Security #Research CTO at Virtual Forge SAP Security Researcher, active since 2003 Received Credits from SAP for 66 reported 0-day Vulnerabilities Speaker at international Conferences SAP TechEd (US & Europe), BlackHat (Europe), Hack in the Box (Europe) Troopers (Europe), IT Defense (Europe), RSA (US) Andreas Wiegenstein Xu Jia Security Analyst at Virtual Forge SAP Security Researcher, active since 2006 Received Credits from SAP for 28 reported 0-day Vulnerabilities Speaker at international Conferences Troopers (2013), Sicherheit und Prüfung von SAP Systemen (2012)
  • 4. Who is SAP? 4 Source:http://www.posters.at/the-simpsons--homer-bier_a34273.html Why protect SAP Systems? More than 248,500 companies run SAP SAP customers… Transport > 1.1 billion flight passengers per year Produce > 65% of all TV’s Produce > 77,000 cars every day Produce > 52% of all movies And… 72% of the world-wide beer production depends on companies that run SAP !!!
  • 5. #Statistics "There are three kinds of lies: lies, damned lies, and statistics." Benjamin Disraeli “Statistics are mendacious truths.” Lionel Strachey “Don’t trust statistics you didn’t falsify yourself.” Unknown
  • 6. …and now we present * Based the number of credits per individual researcher involved in an advisory ** Considering only such advisories that were researched at Starbucks on a Friday afternoon in Heidelberg SAP credits* for security advisories (Since 2010) 5 Companies hold 75% ;-)
  • 7. On SAP Security Notes Source: https://www.virtualforge.com/de/blog/post/security-research-2013-en.html Average before 2013: 16% Average notes/month: 61 Average in 2013: 61% Average notes/month: 28
  • 8. Agenda Motivation Hosted SAP Application Variant A : Multi-System Hosted SAP Application Variant B : Single-System Demo 8
  • 11. Hosted SAP Application Variant A: Multi-System
  • 13. Risks in Multi-System Hosting SAP Solution Manager (SolMan) SolMan has a very high attack surface If SAP Solution Manager falls, all connected systems fall Many SolMan applications are Web-based A critical SAP 0day in SolMan can result in access to all data of all hosted companies 13
  • 14. Risks in Multi-System Hosting – SolMan on the Internet Some URL Patterns of SAP Solution Manager /sap/bc/webdynpro/sap/ags_workcenter /sap/bc/bsp/sap/ags_rbe_report /sap/bc/webdynpro/sap/ags_dswp_infra_wc /sap/bc/webdynpro/sap/ags_work_gui_default_set 14
  • 15. Hosted SAP Application Variant B: Single-System
  • 16. SAP Open SQL is by design implicitly protecting client-specific data.
  • 17. Risks in Single-System Hosting – Bypassing Client Protection 17 Bypassing OSQL client protection in ABAP programs Explicit bypass using CLIENT SPECIFIED Implicit bypass using EXECSQL Implicit bypass using ADBC
  • 18. The following Risks exist in Single-System Hosting 18 Any custom ABAP Code can access all data of all hosted companies Any SAP 0day that allows cross-client access can result in access to all data of all hosted companies -Any ABAP Command Injection Vulnerability -Any Native SQL Injection Vulnerability -Any generic Cross-Client Vulnerability
  • 20. Statistics on Cross-Client Access 20 Custom code performs on average* cross-client accesses per (in-house) installation * Survey of 159 SAP Customers (statistics, again) occurrences of CLIENT SPECIFIED in SAP Standard 76 2000+
  • 21. CVSS Guide Version 2.0 http://www.first.org 2.1.4. Confidentiality Impact (C) Partial (P) There is considerable informational disclosure. Access to some system files is possible, but the attacker does not have control over what is obtained, or the scope of the loss is constrained. An example is a vulnerability that divulges only certain tables in a database. Complete (C) There is total information disclosure, resulting in all system files being revealed. The attacker is able to read all of the system's data (memory, files, etc.)
  • 22. SAP Note (Patch) related to cross-client read Access 22 1718145 VF Advisory SAP-BACK-13 (generic read Access) Sent to SAP: 13.02.2012 Patched on: 14.05.2013 Patch time: 451 days CVSS Rating: 3.5 CVSS Vector: AV:N/AC:M/AU:S/C:P/I:N/A:N
  • 23. CVSS Guide Version 2.0 http://www.first.org 2.1.5. Integrity Impact (I) Partial (P) Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited. For example, system or application files may be overwritten or modified, but either the attacker has no control over which files are affected or the attacker can modify files within only a limited context or scope. Complete (C) There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised. The attacker is able to modify any files on the target system.
  • 24. CVSS Guide Version 2.0 http://www.first.org 2.1.6 Availability Impact (A) Partial (P) There is reduced performance or interruptions in resource availability. An example is a network-based flood attack that permits a limited number of successful connections to an Internet service. Complete (C) There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.
  • 25. SAP Note (Patch) related to cross-client write Access 25 1718145 VF Advisory SAP-BACK-12 (generic read Access) Sent to SAP: 13.02.2012 Patched on: 08.04.2013 Patch time: 415 days CVSS Rating: 6.0 CVSS Vector: AV:N/AC:M/AU:S/C:P/I:P/A:P
  • 27. Secure Hosting Checklist for SAP Customers 27 Does your Hoster install new SAP security notes every month? How does your Hoster deal with custom Code Security? How does your Hoster mitigate risks related to Solution Manager? Are there penetration tests / security audits performed (by SAP security experts) on a regular basis?
  • 30. Thank you for your attention. Questions ? @codeprofiler @XuJia7 Now or later #ThingsWeFoundWhenPentestingSAP