<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>Question Re: SAP RECON Vulnerability - Validation method issue in Technology Q&amp;A</title>
    <link>https://community.sap.com/t5/technology-q-a/sap-recon-vulnerability-validation-method-issue/qaa-p/12257557#M4590688</link>
    <description>&lt;P&gt;Hi Javier,&lt;/P&gt;&lt;P&gt;The purpose of the GET or POST methods are to have the 404 HTTP error returned. If you get this response, then it means that you have correctly performed the fix from SAP Note &lt;A href="https://launchpad.support.sap.com/#/notes/2939665"&gt;2939665.&lt;BR /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cris&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 24 Aug 2020 22:52:47 GMT</pubDate>
    <dc:creator>cris_hansen</dc:creator>
    <dc:date>2020-08-24T22:52:47Z</dc:date>
    <item>
      <title>SAP RECON Vulnerability - Validation method issue</title>
      <link>https://community.sap.com/t5/technology-q-a/sap-recon-vulnerability-validation-method-issue/qaq-p/12257554</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;
  &lt;P&gt;Extracted from the SAP Note #2939665 there are two methods to verify if the vulnerable URL is blocked, by a POST call or a WS Navigator, but using the public python PoC, and after seeing the code myself, it seems that a GET call works too to proof if a server is vulnerable. &lt;/P&gt;
  &lt;P&gt;Could you confirm this? And if yes, Could you change the details in the SAP Note #2939665?&lt;/P&gt;
  &lt;P&gt;Thanks in advance.&lt;/P&gt;
  &lt;P&gt;Regards&lt;/P&gt;
  &lt;P&gt;Javier &lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 17:36:43 GMT</pubDate>
      <guid>https://community.sap.com/t5/technology-q-a/sap-recon-vulnerability-validation-method-issue/qaq-p/12257554</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2020-08-24T17:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: SAP RECON Vulnerability - Validation method issue</title>
      <link>https://community.sap.com/t5/technology-q-a/sap-recon-vulnerability-validation-method-issue/qaa-p/12257555#M4590686</link>
      <description>&lt;P&gt;Hello Javier,&lt;/P&gt;&lt;P&gt;If you have the same 404 HTTP error when using the GET method, then you see that the URL is blocked.&lt;/P&gt;&lt;P&gt;About a change in the details in SAP Note &lt;A href="https://launchpad.support.sap.com/#/notes/2939665" target="_blank"&gt;2939665&lt;/A&gt;, this should be addressed via Support Incident, under BC-INS-CTC component, owner of the SAP Note.&lt;/P&gt;&lt;P&gt;Related to this topic, you can also read KBA &lt;A href="https://launchpad.support.sap.com/#/notes/2948106" target="_blank"&gt;2948106&lt;/A&gt; - FAQ - for SAP Note &lt;A href="https://launchpad.support.sap.com/#/notes/2934135" target="_blank"&gt;2934135&lt;/A&gt; - [CVE-2020-6287] Multiple Vulnerabilities in SAP NetWeaver AS JAVA (LM Configuration Wizard).&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cris&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 17:43:36 GMT</pubDate>
      <guid>https://community.sap.com/t5/technology-q-a/sap-recon-vulnerability-validation-method-issue/qaa-p/12257555#M4590686</guid>
      <dc:creator>cris_hansen</dc:creator>
      <dc:date>2020-08-24T17:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: SAP RECON Vulnerability - Validation method issue</title>
      <link>https://community.sap.com/t5/technology-q-a/sap-recon-vulnerability-validation-method-issue/qaa-p/12257556#M4590687</link>
      <description>&lt;P&gt;Thanks for the reply. &lt;/P&gt;&lt;P&gt;So it means that "yes" a GET call is also valid to verify the vulnerability. Would you agree?&lt;/P&gt;&lt;P&gt;In addition: &lt;/P&gt;&lt;P&gt;Would the part "?wsdl" call from the URL: &lt;A href="https://&amp;lt;host&amp;gt;:&amp;lt;port&amp;gt;/CTCWebService/CTCWebServiceBean?wsdl" target="test_blank"&gt;https://&amp;lt;host&amp;gt;:&amp;lt;port&amp;gt;/CTCWebService/CTCWebServiceBean?wsdl&lt;/A&gt; also indicates that a system is vulnerable?&lt;/P&gt;&lt;P&gt;Would it be a good practice to scan for this vulnerability on all the possible JAVA ports reported by SAP &lt;A href="https://help.sap.com/viewer/ports" target="_blank"&gt;here&lt;/A&gt;?&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Javier&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 22:38:28 GMT</pubDate>
      <guid>https://community.sap.com/t5/technology-q-a/sap-recon-vulnerability-validation-method-issue/qaa-p/12257556#M4590687</guid>
      <dc:creator>Former Member</dc:creator>
      <dc:date>2020-08-24T22:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: SAP RECON Vulnerability - Validation method issue</title>
      <link>https://community.sap.com/t5/technology-q-a/sap-recon-vulnerability-validation-method-issue/qaa-p/12257557#M4590688</link>
      <description>&lt;P&gt;Hi Javier,&lt;/P&gt;&lt;P&gt;The purpose of the GET or POST methods are to have the 404 HTTP error returned. If you get this response, then it means that you have correctly performed the fix from SAP Note &lt;A href="https://launchpad.support.sap.com/#/notes/2939665"&gt;2939665.&lt;BR /&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Cris&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Aug 2020 22:52:47 GMT</pubDate>
      <guid>https://community.sap.com/t5/technology-q-a/sap-recon-vulnerability-validation-method-issue/qaa-p/12257557#M4590688</guid>
      <dc:creator>cris_hansen</dc:creator>
      <dc:date>2020-08-24T22:52:47Z</dc:date>
    </item>
  </channel>
</rss>

