Description
Exploiting weak/predictable user credentials is one of the most common and successful attack scenarios used against SAP systems. During the installation, SAP systems create the standard users SAP*, DDIC and EARLYWATCH. Invicti tried the default passwords for these standard users (and other commonly used SAP users) and managed to guess a set of credentials that were accepted by the SAP system.
Remediation
To protect standard SAP users from unauthorized use:
- Define a new superuser and deactivate SAP*.
- Change all of the default passwords for these users.
References
Related Vulnerabilities
WordPress Plugin Slack-Chat Information Disclosure (1.5.5)
Clockwork PHP dev tool enabled
PostgreSQL Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2017-15099)
WordPress 4.5.x Multiple Vulnerabilities (4.5 - 4.5.27)
phpMyAdmin Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-2206)