Volume IV: The Invoker Servlet – A Dangerous Detour into SAP Java Solutions

SAP Application Servers Java, supported by the J2EE Engine, serve as the base framework for running critical solutions such as the SAP Enterprise Portal, SAP Exchange Infrastructure (XI), SAP Process Integration (PI) and SAP Mobile Infrastructure (MI). In addition, customers can also deploy their own custom Java applications on these platforms.

In December 2010, SAP released an important white-paper describing how to protect against common attacks against these applications. Among the security concepts detailed, there was one that was particularly critical: the Invoker Servlet. This functionality is subject to several threats to SAP platforms, such as the possibility of completely bypassing the authentication and authorization mechanisms.

This publication analyzes the Invoker Servlet Detour attack, identifying the root cause of this threat, how to verify whether your platform is exposed and how to mitigate it, effectively protecting your business-critical information against cyber-attacks.

Volume II: SAP Knowledge Management - The Risks of Sharing

SAP Knowledge Management (SAP KM) is a central component of the SAP Enterprise Portal, enabling the information extracted from numerous data sources within the Organization to be displayed in a single access point.

Employees, customers, vendors and business partners use this platform to interact with data provided by the company in order to fulfill their different business requirements. The business information available in SAP KM, can be highly sensitive and unauthorized access and/or manipulation of data could imply high risks for any company.

Our experience in this field indicates that due to lack of proper access-control implementations, combined with default and permissive policies, many organizations are exposing sensitive information through SAP Enterprise Portal to unauthorized parties.

This volume analyzes in detail some of the risks that affect the security of SAP Knowledge Management and presents possible solutions to mitigate those risks, allowing you to increase the security level of your SAP Enterprise Portal installation.

Volume I: The Risks of Downwards Compatibility

SAP has implemented several unique password hashing procedures in its history. While each new version has increased the security level of their hashing scheme, the requirements for backward compatibility, if not considered in the implementation phase, may provide an opportunity for attacks against users’ stored credentials. Through the exploitation of these weaknesses, malicious attackers would be able to escalate privileges over vulnerable systems and perform business processes while impersonating other users.

This SAP Security In-Depth volume details the evolution of these hashing mechanisms developed by SAP, analyzes the different risk levels of attacks targeting this sensitive information and provides practical mitigation processes to protect the company’s SAP platform.