THE STATE OF SAP SECURITY 2013: VULNERABILITIES, THREATS AND TRENDS



Similar documents
A GLOBAL SURVEY Authors:

If I want a perfect cyberweapon, I'll target ERP

EAS-SEC Project: Securing Enterprise Business Applications

Top 10 most interesting SAP vulnerabilities and attacks Alexander Polyakov

Top 10 most interes.ng SAP vulnerabili.es and a9acks

sec.org

Invest in security to secure investments. Breaking SAP Portal. Dmitry Chastuhin Principal Researcher at ERPScan

Inception of the SAP Platform's Brain Attacks on SAP Solution Manager

Auditing the Security of an SAP HANA Implementation

ATTACKS TO SAP WEB APPLICATIONS

Members of the UK cyber security forum. Soteria Health Check. A Cyber Security Health Check for SAP systems

The SAProuter An Internet Window to your SAP Platform (and beyond)

PRACTICAL PENTESTING OF ERP SYSTEMS AND BUSINESS

Research Paper SAP Penetration Testing Using Metasploit

A crushing blow at the heart of SAP J2EE Engine. For BlackHat USA Version 1.0

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Thick Client Application Security

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

SAP Certified Technology Professional - Security with SAP NetWeaver 7.0. Title : Version : Demo. The safer, easier way to help you pass any IT exams.

CRYPTUS DIPLOMA IN IT SECURITY

Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security

Application Security Best Practices. Wally LEE Principal Consultant

Attacks to SAP. Web Applications Your crown jewels online. Mariano Nuñez Di Croce. Troopers, Germany. March 30th,

CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed?

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Web Application Security

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Alexander Polyakov CTO ERPScan

Too Critical To Fail Cyber-Attacks on ERP, CRM, SCM and HR Systems

Security Implications of Oracle Product Desupport April 23, 2015

SAP Netweaver Application Server and Netweaver Portal Security

Forgotten World: Corporate Business Application Systems

Penetration: from Application down to OS

SCUR204 Strong Infrastructure and Network Security for Heterogeneous Applications

CaliberRM / LDAP Integration. CaliberRM

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Invest in security to secure investments Oracle PeopleSoft applications are under attacks!

FREQUENTLY ASKED QUESTIONS

Andreas Wiegenstein Dr. Markus Schumacher

Web Application Security

Different ways to guess Oracle database SID

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

2012 Data Breach Investigations Report

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Web Application Report

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

SAST, DAST and Vulnerability Assessments, = 4

Web App Security Audit Services

SAP. Penetration Testing. with Onapsis Bizploit. Mariano Nuñez. Di Croce. HITB Security Conference, Dubai. April 22,

MatriXay Database Vulnerability Scanner V3.0

Evolution of Penetration Testing

Secure Web Applications. The front line defense

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

June Palo Alto Networks 3300 Olcott Street Santa Clara, CA

Bank Hacking Live! Ofer Maor CTO, Hacktics Ltd. ATC-4, 12 Jun 2006, 4:30PM

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Hacking Database for Owning your Data

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

SAP SECURITY AND AUTHORIZATIONS - RISK MANAGEMENT AND COMPLIANCE WITH LEGAL REGULATIONS IN THE SAP ENVIRONMENT

Sample Report. Security Test Plan. Prepared by Security Innovation

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Web Application Security

What is Web Security? Motivation

Integrigy Corporate Overview

Application Gateway with Apache

Directory and File Transfer Services. Chapter 7

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis. Patrick Hildenbrand, Product Management Security, SAP AG September 2014

CYBER TRENDS & INDUSTRY PENETRATION TESTING. Technology Risk Supervision Division Monetary Authority of Singapore

Secret Server Qualys Integration Guide

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Attack Vector Detail Report Atlassian

Securing SharePoint 101. Rob Rachwald Imperva

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

AT-S39 Version 1.3 Management Software for the AT-8024 and AT-8024GB Fast Ethernet Switches. Software Release Notes

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Oracle Database Security Myths

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

Basics of Internet Security

Understanding Security Testing

Virtualization System Security

SAP SECURITY CLEARING THE CONFUSION AND TAKING A HOLISTIC APPROACH

Hardening of SAP HTTP- and Webservices

Hardening of SAP HTTP- and Webservices

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

SAP NetWeaver Application Server Add-On for Code Vulnerability Analysis

Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Web Engineering Web Application Security Issues

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Transcription:

THE STATE OF SAP SECURITY 2013: VULNERABILITIES, THREATS AND TRENDS Alexander Polyakov ERPScan Session ID: DAS-T03 Session Classification: Intermediate

Agenda SAP: Intro SAP: vulnerabilities SAP: threats from the Internet Critical SAP services Known incidents Future trends and predictions Conclusions

Agenda The most popular business application More than 180000 customers worldwide 74% of Forbes 500 run SAP

Why SAP security? Espionage Stealing financial information Stealing corporate secrets Stealing supplier and customer lists Stealing HR data Sabotage Denial of service Modification of financial reports Access to technology network (SCADA) by trust relations Fraud False transactions Modification of master data

SAP Vulnerabilities

Security notes by year More than 2600 in total

Security notes by criticality High priority vulnerabilities Low priority vulnerabilities 100 12 80 60 40 20 10 8 6 4 2 0 2012 2011 2010 2009 0 2012 2011 2010 2009 By the end of April 2013 6 - Recommendations/additional info 4 - Correction with low priority 3 - Correction with medium priority 2 - Correction with high priority 1 - HotNews 0 200 400 600 800 1000 1200 1400 1600 1800 2000

Security notes by type Top 10 vulnerabilities by type 1% 4% 3% 5% 4% 25% 1 - XSS 2 - Missing authorisation check 3 - Directory traversal 7% 4 - SQL Injection 5 - Information disclosure 6 - Code injection 9% 7 - Unauthentication bypass 8 - Hardcoded credentials 22% 9 - Remore code execution 10 - Verb tampering 20%

Acknowledgments Number of vulnerabilities found by external researchers: 2010-58 2011-107 2012-89 2013-52 70 60 50 40 30 20 Percentage of vulnerabilities found by external researchers: 10 0 2010 2011 2012 2013 The record of vulnerabilities found by external researchers was cracked in January 2013: 76%

Acknowledgments More interest from other companies 7 6 Number of already patched issues per year 5 4 3 2 1 0 2010 2011 2012 * Number of vulnerabilities that were sent to SAP but were rejected because they were already found before by other company of SAP internal code review.

SAP security talks at conferences 35 30 25 20 15 10 5 0 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013

Talks about: Common: SAP Backdoors, SAP Rootkits, SAP Forensics Services: SAP Gateway, SAP Router, SAP NetWeaver, SAP GUI, SAP Portal, SAP Solution Manager, SAP TMS, SAP Management Console, SAP ICM/ITS Protocols: DIAG, RFC, SOAP (MMC), Message Server, P4 Languages: ABAP Buffer Overflow, ABAP SQL Injection, J2EE Verb Tampering, J2EE Invoker Servlet Overview: SAP Cyber-attacks, Top 10 Interesting Issues, Myths about ERP Almost every part of SAP was hacked

Top 5 SAP vulnerabilities 2012 1. SAP NetWeaver DilbertMsg servlet SSRF (June) 2. SAP HostControl command injection (May) 3. SAP SDM Agent command injection (November) 4. SAP Message Server buffer overflow (February) 5. SAP DIAG buffer overflow (May)

SAP NetWeaver DilbertMsg servlet SSRF Espionage: Sabotage: Fraud: Availability: Ease of exploitation: Future impact: CVSSv2: Advisory: Critical Critical Medium Anonymously through the Internet Medium High (New type of attack) 10 (according to ERPScan researchers) http://erpscan.com/advisories/dsecrg-12-036-sap-xiauthentication-bypass/ Patch: Sap Note 1707494 Authors: Alexander Polyakov, Alexey Tyurin, Alexander Minozhenko (ERPScan)

SAP HostControl command injection Espionage: Sabotage: Fraud: Availability: Ease of exploitation: Critical Critical Critical Anonymously through the Internet Easy (a Metasploit module exists) Future impact: Low (Single issue) CVSSv2: 10 (according to ERPScan researchers) Advisory: http://www.contextis.com/research/blog/sap-parameterinjection-no-space-arguments/ Patch: SAP note 1341333 Author: Contextis

SAP J2EE file read/write Espionage: Sabotage: Fraud: Availability: Ease of exploitation: Future impact: CVSSv2: Advisory: Critical Critical Critical Anonymously Medium Low 10 (according to ERPScan researchers) https://service.sap.com/sap/support/notes/1682613 Patch: SAP Note 1682613 Author: Juan Pablo

SAP Message Server buffer overflow Espionage: Sabotage: Fraud: Availability: Ease of exploitation: CVSSv2: Advisory: Critical Critical Critical Anonymous Medium. Good knowledge of exploit writing for multiple platforms is necessary 10 (according to ERPScan researchers) http://www.zerodayinitiative.com/advisories/zdi-12-112/ Patch: SAP Notes 1649840 and 1649838 Author: Martin Gallo

SAP DIAG Buffer overflow Espionage: Sabotage: Fraud: Availability: Ease of exploitation: CVSSv2: Advisory: Critical Critical Critical Low. Trace must be on Medium 9.3 (according to ERPScan researchers) http://www.coresecurity.com/content/sap-netweaverdispatcher-multiple-vulnerabilities Patch: SAP Note 1687910 Author: Martin Gallo

SAP and the Internet

SAP on the Internet Companies have SAP Portals, SAP SRMs, SAP CRMs remotely accessible Companies connect different offices (by SAP XI) Companies are connected to SAP (through SAP Router) SAP GUI users are connected to the Internet Administrators open management interfaces to the Internet for remote control Almost all business applications have web access now

Google search for web-based SAPs As a result of the scan, 695 unique servers with different SAP web applications were found (14% more than in 2011) 22% of previously found services were deleted 35% growth in the number of new services

Google search by country SAP web servers by country (Top 20) UNITED STATES GERMANY INDIA UNITED KINGDOM CHINA NETHERLANDS ITALY SWITZERLAND BRAZIL CANADA FRANCE BELGIUM NORWAY KOREA SPAIN MEXICO DENMARK AUSTRIA RUSSIA FINLAND 0 50 100 150 200 250

Shodan scan A total of 3741 server with different SAP web applications were found 120% 100% Growth by application server 80% 20% 6% 41% 60% 40% 94% 72% 34% 20% 30% 0% SAP NetWeaver J2EE SAP NetWeaver ABAP -20% -40% -20% -55% SAP Web Application Server -60% Other (BusinessObjects,SAP Hosting, etc) -80%

Shodan scan by country 600% 500% 400% 300% 200% 100% 0% Growth of SAP web servers (Top 5) MEXICA CHILE INDIA CHINA TAIWAN SAP web servers by country (Top 20) UNITED STATES GERMANY ITALY INDIA SPAIN BRAZIL BELGIUM FRANCE CHINA KOREA UNITED KINGDOM SWITZERLAND CANADA TURKEY NETHERLANDS DENMARK MEXICO CHILE TAIWAN AUSTRALIA 0 200 400 600 800 1000 1200

Internet Census 2012 scan Not so legal project by Carna Botnet As a result, 3326 IPs with SAP web applications NO SSL 32% SSL 68%

SAP NetWeaver ABAP - versions 7.3 growth by 250% 7.2 growth by 70% 7.0 loss by 22% 6.4 loss by 45% NetWeaver ABAP versions by popularity 11% 19% 6% 5% 23% 35% 7.0 EHP 0 (Nov 2005) 7.0 EHP 2 (Apr 2010) 7.0 EHP 1 (Oct 2008) 7.3 (Jun 2011) 6.2 (Dec 2003) 6.4 (Mar 2004) The most popular release (35%, previously 45%) is still NetWeaver 7.0, and it was released in 2005! But security is getting better.

NetWeaver ABAP information disclosure Information about the ABAP engine version can be easily found by reading an HTTP response Detailed info about the patch level can be obtained if the application server is not securely configured An attacker can get information from some pages like /sap/public/info 6% (was 59%) of servers still have this issue

SAP NetWeaver ABAP critical services Execute dangerous RFC functions using HTTP requests NetWeaver ABAP URL /sap/bc/soap/rfc Can be protected by Security Note 1394100: Access to RFC-enabled modules via SOAP There are several critical functions, such as: Read data from SAP tables Create SAP users Execute OS commands Make financial transactions, etc. By default, any user can have access to this interface and execute the RFC_PING command. So there are 2 main risks: If there is a default username and password, the attacker can execute numerous dangerous RFC functions If a remote attacker obtains any existing user credentials, they can execute a denial of service attack with a malformed XML packet Can be protected by Security Note 931252: Authority Check for Function Group SRFC Secure Configuration of SAP NetWeaver Application Server Using ABAP

SAP NetWeaver J2EE - versions 7.31 growth from 0 to 3% 7.30 growth from 0 to 9% 7.02 growth by 67% 7.0 loss by 23% 6.4 loss by 40% NetWeaver JAVA versions by popularity 9% 10% 9% 3% 25% 44% NetWeaver 7.00 NetWeaver 7.01 NetWeaver 7.02 NetWeaver 7.30 NetWeaver 6.40 NetWeaver 7.31 The most popular release (44%, previously 57%) is still NetWeaver 7.0, and it was released in 2005! But security is getting better.

SAP NetWeaver J2EE information disclosure Information about the J2EE engine version can be easily found by reading an HTTP response. Detailed info about the patch level can be obtained if the application server is not securely configured and allows an attacker to get information from some pages: /rep/build_info.jsp year) /bcb/bcbadmsysteminfo.jsp /AdapterFramework/version/version.jsp 26% (61% last 1.5% (17% last year) 2.7% (a new issue) To secure your SAP system, use these SAP Security Notes: 1503856: Potential information disclosure relating to server info 1548548: Missing authentication in Business Communication Broker 1679897: PI SEC: Potential information disclosure in PI AF

SAP NetWeaver J2EE critical services NetWeaver J2EE URL: /ctc/configtool (and 30 others) Can be exploited without authentication There are several critical functions, such as: Create users Assign a role to a user Execute OS commands Remotely turn J2EE Engine on and off Was presented by us at BlackHat 2011 To protect your system, use SAP Security Note: 1589525: Verb Tampering issues in CTC It was found that 50% (was 61%) of J2EE systems on the Internet have the CTC service enabled.

From Internet to Intranet

Disclaimer * Some numbers are approximate (mostly less than in real world) due to the very high amount of resources needed to fully analyze the Internet for SAP services with detailed numbers. We use optimized scan approach, which will be described in the whitepaper. More precise numbers will be published next month, after all the scans are finished and the results are fully analyzed.

SAProuter Special application proxy Transfers requests from Internet to SAP (and not only) Can work through VPN or SNC Almost every company uses it for connecting to SAP to download updates Usually listens to port 3299 Internet accessible (approximately 5000 IPs ) http://www.easymarketplace.de/saprouter.php Almost every third company have SAProuter accessible from internet by default port.

SAProuter: known issues Absence of ACL 15% Possible to proxy any request to any internal address Information disclosure about internal systems 19% Denial of service by specifying many connections to any of the listed SAP servers Proxy requests to internal network if there is absence of ACL Insecure configuration, authentication bypass 5% Heap corruption vulnerability

Port scan results Are you sure that only the necessary SAP services are exposed to the Internet? We were not In 2011, we ran a global project to scan all of the Internet for SAP services It is not completely finished yet, but we have the results for the top 1000 companies We were shocked when we saw them first

Popular OS and DB Popular OS for SAP Popular RDBMS for SAP Backend Windows NT - 28% AIX - 25% Linux - 19% SunOS - 13% HP-UX - 11% OS/400-4% Oracle - 59% DB2-19% MsSQL - 17% MaxDB - 5%

Port scan results 35 30 25 Exposed services 2011 Exposed services 2013 20 15 10 5 0 SAP HostControl SAP Dispatcher SAP MMC SAP Message Server httpd SAP Message Server SAP Router The listed services should not be accessible from the Internet

Singapore vs. Average 30 25 20 15 10 5 0 SAP Dispatcher SAP MMC SAP Message Server SAP HostControl SAP ITS Agate SAP Message Server httpd

SAP HostControl service SAP HostControl is a service which allows remote control of SAP systems There are some functions that can be used remotely without authentication Issues: Read developer traces with passwords Remote command injection About every 120 th (was 20 th ) company is vulnerable REMOTELY About 35% systems assessed locally

SAP Management console SAP MMC allows remote control of SAP systems There are some functions that can be used remotely without authentication Issues: Read developer traces with passwords Read logs with JsessionIDs Read information about parameters About every 40 th (was 11 th ) company is vulnerable REMOTELY About 80% systems locally To secure your system, use SAP Security Notes: 927637: Web service authentication in sapstartsrv as of Release 7.00 1439348: Extended security settings for sapstartsrv

SAP Message Server SAP Message Server load balancer for App servers Usually, this service is only available inside the company By default, the server is installed on the 36NN port Issue: Memory corruption Information disclose Unauthorized service registration (MITM) About every 60 th (was every 10 th ) company is vulnerable REMOTELY About 50% systems locally

SAP Message Server HTTP HTTP port of SAP Message Server Usually, this service is only available inside the company By default, the server is installed on the 81NN port Issue: unauthorized read of profile parameters Fixed by SAP Security Note 916398: HTTP access control for Message Server About every 60 th (was every 10 th ) company is vulnerable REMOTELY About 90% systems locally

SAP Dispatcher service SAP Dispatcher - client-server communications It allows connecting to SAP NetWeaver using the SAP GUI application through DIAG protocol Should not be available from the Internet in any way Issues: There are a lot of default users that can be used to connect and fully compromise the system remotely Also, there are memory corruption vulnerabilities in Dispatcher About every 20 th (was 6 th ) company is vulnerable REMOTELY To secure your system, use SAP Security Note: 1741793: Potential remote termination of running work processes

But who actually tried to exploit it?

Known incidents related to SAP security and internal fraud Exploit market interest Anonymous attacks Insider attacks Evil subcontractors and ABAP backdoors

Market Interest Whitehat buyers and sellers Companies like ZDI buy exploits for SAP Only in 2012 ZDI publish 5 critical SAP issues Whitehat buyers and different sellers Companies who trade 0-days say that there is interest from both sides Black market Anonymous attack? Why not?

Market Interest

Insider attacks The Association of Certified Fraud Examiners (ACFE) survey showed that U.S. organizations lose an estimated 7% of annual revenues to fraud. Real examples that we met: Salary modification Material management fraud Mistaken transactions

Evil subcontractors and ABAP Backdoors They exist! Sometimes, it is possible to find them

What has happened already? AutoCAD virus (Industrial espionage) http://www.telegraph.co.uk/technology/news/9346734/espionage -virus-sent-blueprints-to-china.html Internet-Trading virus (Fraud) Ranbys modification for QUICK http://www.welivesecurity.com/2012/12/19/win32spy-ranbyusmodifying-java-code-in-rbs/ News resources hacking (Sabotage) http://www.bloomberg.com/news/2013-04-23/dow-jones-dropsrecovers-after-false-report-on-ap-twitter-page.html

What is next? Just imagine what could be done by breaking: One SAP system All SAP systems of a company All SAP systems in a particular country Everything

SAP strategy in app security Now security is the number 1 priority for SAP Implemented own internal security process SDLC Security summits for internal teams Internal trainings with external researchers Strong partnership with research companies Investments in automatic and manual security assessment of new and old software

Future threads and predictions Old issues are being patched, but a lot of new systems have vulnerabilities Number of vulnerabilities per year is going down compared to 2010, but they are more critical Number of companies which find issues in SAP is growing Still, there are many uncovered areas in SAP security SAP forensics can be a new research area because it is not easy to find evidence now, even if it exists

Forensics as a new trend for 2013 If there are no attacks, it doesn t mean anything Companies don t like to share information about data compromise Companies are not capable of identifying attacks Only 10% of systems use security audit at SAP Only 2% of systems analyze them Only 1% do correlation and deep analysis * Based on the assessment of over 250 servers of companies that allowed us to share results.

Forensics as a new trend for 2013 ICM log icm/http/logging_0 70% Security audit log in ABAP 10% Table access logging rec/client 4% Message Server log ms/audit 2% SAP Gateway access log 2% * Based on the assessment of over 250 servers of companies that allowed us to share results.

SAP Security tools VA and configuration monitoring 8 2 SoD 10+ 3 1 1 1 2 1 1 SIEM 6 2 ABAP code security 3 * We did not compare the quality of the tools and their coverage. For example, SIEM capabilities for SAP can be found in many SIEM solutions, but they cover 10% of all log file types. The same applies to Vulnerability assessment: we collected tools that have general scan capabilities including SAP as well as only SAP related. SAP checks in those tools can amount to 10 to 7000.

Conclusion - The interest in SAP platform security has been growing exponentially, and not only among whitehats + SAP security in default configuration is getting much better now - SAP systems can become a target not only for direct attacks (for example APT) but also for mass exploitation + SAP invests money and resources in security, provides guidelines, and arranges conferences - unfortunately, SAP users still pay little attention to SAP security + I hope that this talk and the report that will be published next month will prove useful in this area

Conclusion Issues are everywhere but the risks and the price of mitigation are different

Future work I'd like to thank SAP Product Security Response Team for their great cooperation to make SAP systems more secure. Research is always ongoing, and we can't share all of it today. If you want to be the first to see new attacks and demos, follow us at @erpscan and attend future presentations: End of June Release of SAP Security in Figures 2013 July 30 Talk and Exhibition at BlackHat USA (Las Vegas, USA) September 10-12 BlackHat Trainings (Istanbul, Turkey)

Questions?