Vulnerability Details : CVE-2020-6287
Public exploit exists!
SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.50, does not perform an authentication check which allows an attacker without prior authentication to execute configuration tasks to perform critical actions against the SAP Java system, including the ability to create an administrative user, and therefore compromising Confidentiality, Integrity and Availability of the system, leading to Missing Authentication Check.
Products affected by CVE-2020-6287
- cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*
- cpe:2.3:a:sap:netweaver_application_server_java:7.31:*:*:*:*:*:*:*
CVE-2020-6287 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
SAP NetWeaver Missing Authentication for Critical Function Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
SAP NetWeaver Application Server Java Platforms contains a missing authentication for critical function vulnerability allowing unauthenticated access to execute configuration tasks and create administrative users.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2020-6287
Added on
2021-11-03
Action due date
2022-05-03
Exploit prediction scoring system (EPSS) score for CVE-2020-6287
97.42%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2020-6287
-
SAP Unauthenticated WebService User Creation
Disclosure Date: 2020-07-14First seen: 2020-07-23auxiliary/admin/sap/cve_2020_6287_ws_add_userThis module leverages an unauthenticated web service to submit a job which will create a user with a specified role. The job involves running a wizard. After the necessary action is taken, the job is canceled to avoid unnecessary system changes. Authors: - P
CVSS scores for CVE-2020-6287
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
10.0
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3.9
|
6.0
|
SAP SE | |
10.0
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
3.9
|
6.0
|
NIST |
CWE ids for CVE-2020-6287
-
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2020-6287
-
https://launchpad.support.sap.com/#/notes/2934135
SAP ONE Support Launchpad: Log OnPermissions Required;Vendor Advisory
-
http://seclists.org/fulldisclosure/2021/Apr/6
Full Disclosure: Onapsis Security Advisory 2021-0003: [CVE-2020-6287] - [SAP RECON] SAP JAVA: Unauthenticated execution of configuration tasksMailing List;Third Party Advisory
-
http://packetstormsecurity.com/files/162085/SAP-JAVA-Configuration-Task-Execution.html
SAP JAVA Configuration Task Execution ≈ Packet StormThird Party Advisory;VDB Entry
-
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=552599675
SAP Security Patch Day – July 2020 - Product Security Response at SAP - Community WikiVendor Advisory
-
https://www.onapsis.com/recon-sap-cyber-security-vulnerability
SAP RECON Cybersecurity Vulnerability | OnapsisThird Party Advisory
Jump to