{"id":10289,"date":"2022-05-19T09:01:15","date_gmt":"2022-05-19T09:01:15","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?post_type=session&#038;p=10289"},"modified":"2023-07-19T23:17:39","modified_gmt":"2023-07-19T23:17:39","slug":"from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results","status":"publish","type":"session","link":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/","title":{"rendered":"From Unknown Parameter to Root: A Story of Unexpected Intrusion Testing Results"},"content":{"rendered":"<p style=\"text-align: justify;\">In the past thirteen years, SAP still has an endless stream of vulnerabilities patched, some of which are not known to the world, however, they are hidden threats that could lead to disasters.<\/p>\n<p style=\"text-align: justify;\">This time we would like to tell a story. A story where everything starts from a classical pentest against a SAP System running in brand new SAP Cloud environment : &#8220;RISE with SAP&#8221;. We will explain how <strong>we found critical vulnerabilities in the SAP Start Service initially exploitable locally, but because of the &#8220;hidden&#8221; parameter also exploitable remotely<\/strong>. From the environment setup, to the binaries saposcol.exe and sldreg.exe analysis as well as the network communication between all components. Ultimately ending with the discovery of a memory corruption with libc leak and an OS command injection both leading to RCE as root or NT\/SYSTEM.<\/p>\n<p style=\"text-align: justify;\">We plan to show a recorded demonstration of the exploitation of these vulnerabilities. We will provide all recommendations and the *new* documentation about the &#8220;not hidden anymore&#8221; parameter as well as all related SAP OSS Notes numbers and CVE covered in this talk.<\/p>\n","protected":false},"template":"","class_list":["post-10289","session","type-session","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>From Unknown Parameter to Root: A Story of Unexpected Intrusion Testing Results - HITBSecConf2023 - Phuket<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"From Unknown Parameter to Root: A Story of Unexpected Intrusion Testing Results - HITBSecConf2023 - Phuket\" \/>\n<meta property=\"og:description\" content=\"In the past thirteen years, SAP still has an endless stream of vulnerabilities patched, some of which are not known to the world, however, they are hidden threats that could lead to disasters. This time we would like to tell a story. A story where everything starts from a classical pentest against a SAP System [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2023 - Phuket\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-19T23:17:39+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/\",\"name\":\"From Unknown Parameter to Root: A Story of Unexpected Intrusion Testing Results - HITBSecConf2023 - Phuket\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website\"},\"datePublished\":\"2022-05-19T09:01:15+00:00\",\"dateModified\":\"2023-07-19T23:17:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Session\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"From Unknown Parameter to Root: A Story of Unexpected Intrusion Testing Results\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/\",\"name\":\"HITBSecConf2023 - Phuket\",\"description\":\"August 22 - 26 @ InterContinental\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"From Unknown Parameter to Root: A Story of Unexpected Intrusion Testing Results - HITBSecConf2023 - Phuket","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/","og_locale":"en_US","og_type":"article","og_title":"From Unknown Parameter to Root: A Story of Unexpected Intrusion Testing Results - HITBSecConf2023 - Phuket","og_description":"In the past thirteen years, SAP still has an endless stream of vulnerabilities patched, some of which are not known to the world, however, they are hidden threats that could lead to disasters. This time we would like to tell a story. A story where everything starts from a classical pentest against a SAP System [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/","og_site_name":"HITBSecConf2023 - Phuket","article_modified_time":"2023-07-19T23:17:39+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/","name":"From Unknown Parameter to Root: A Story of Unexpected Intrusion Testing Results - HITBSecConf2023 - Phuket","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website"},"datePublished":"2022-05-19T09:01:15+00:00","dateModified":"2023-07-19T23:17:39+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/from-unknown-parameter-to-root-a-story-of-unexpected-intrusion-testing-results\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/"},{"@type":"ListItem","position":2,"name":"Session","item":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/session\/"},{"@type":"ListItem","position":3,"name":"From Unknown Parameter to Root: A Story of Unexpected Intrusion Testing Results"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/","name":"HITBSecConf2023 - Phuket","description":"August 22 - 26 @ InterContinental","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/session\/10289"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/session"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/types\/session"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/media?parent=10289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}