1. Symantec/
  2. Security Response/
  3. Attack Signatures/
  4. Web Attack: SAP Management Console OSEXEC

Web Attack: SAP Management Console OSEXEC

Severity: High

This attack could pose a serious security threat. You should take immediate action to stop any damage or prevent further damage from happening.

Description

This signature detect attempts to exploit a remote code execution vulnerability in SAP Management Console

Additional Information

SAP Management Console provides a common framework for centralized system management.

SAP Management Console is prone to a remote code-execution vulnerability. This issue affects the SOAP interface when handling a malicious 'OSExecute' payload. In order to exploit this issue an attacker must have access to a valid username and password.

Attackers can exploit this issue to execute arbitrary code within the context of the affected application. Successful exploits will compromise the affected application and possibly the underlying computer. Failed exploit attempts will result in a denial-of-service condition.

This BID is being retired. The issue described is a feature of the application requiring administrative access. No privileges are gained.

Affected

  • SAP Management Console

Response

Currently, we are not aware of any vendor supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: vuldb@securityfocus.com.

Additional References

  • Twitter
  • Facebook
  • LinkedIn
  • Google+
  • YouTube