漏洞信息详情
SAP Netweaver 命令注入漏洞
漏洞简介
SAP NetWeaver是德国思爱普(SAP)公司的一套面向服务的集成化应用平台。该平台可为SAP应用提供开发和运行环境。
SAP Netweaver 7.40 SP 12版本中的SCTC subpackage中的‘SCTC_REFRESH_EXPORT_TAB_COMP’、‘SCTC_REFRESH_CHECK_ENV’和‘SCTC_TMS_MAINTAIN_ALOG’函数中存在命令注入漏洞。远程攻击者可通过调用‘SYSTEM\'\'函数利用该漏洞执行任意命令。
漏洞公告
目前厂商已经发布了升级补丁以修复此安全问题,详情请关注厂商主页:
http://go.sap.com/
参考网址
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2016/Oct/1
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2016/Oct/0
来源:FULLDISC
链接:http://seclists.org/fulldisclosure/2016/Oct/2
来源:www.onapsis.com
链接:https://www.onapsis.com/blog/analyzing-sap-security-notes-march-2016
来源:www.onapsis.com
链接:https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctcrefreshexporttabcomp
来源:www.onapsis.com
链接:https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctctmsmaintainalog
来源:www.onapsis.com
链接:https://www.onapsis.com/research/security-advisories/sap-os-command-injection-sctcrefreshcheckenv
来源:packetstormsecurity.com
链接:http://packetstormsecurity.com/files/138952/SAP-Netweaver-7.40-SP-12-SCTC_TMS_MAINTAIN_ALOG-Command-Injection.html
来源:packetstormsecurity.com
链接:http://packetstormsecurity.com/files/138951/SAP-Netweaver-7.40-SP-12-SCTC_REFRESH_CHECK_ENV-Command-Injection.html
来源:packetstormsecurity.com
链接:http://packetstormsecurity.com/files/138950/SAP-Netweaver-7.40-SP-12-SCTC_REFRESH_EXPORT_TAB_COMP-Command-Injection.html
受影响实体
- Sap Netweaver:7.40:Sp12<!--2000-1-1-->
补丁
- SAP Netweaver 命令注入漏洞的修复措施<!--2016-10-10-->
还没有评论,来说两句吧...