|Click here for more of Dark Reading's Black Hat articles.|
The new class of vulnerabilities could enable an attacker to gain control of a company's financial flow, providing the path for espionage, sabotage, or fraud, Polyakov says in a press release.
The flaw, which Polyakov foun in the J2EE engine of SAP's NetWeaver software, allows and attacker to bypass authorization checks. "For example, it is possible to create a user and assign him to the administrators' group using two unauthorized requests to the system, the release states. The attack works even when systems are protected by two-factor authentication.
To prove the vulnerability, researchers from Polyakov's company, ERPScan, created a program that detects SAP servers on the Internet. More than half of the servers detected with this new program displayed the authorization vulnerability.
"During our research, we detected several examples [of the vulnerability] in the standard system configuration," Polyakov states in the release. "And because each company customizes the system under its own business processes, new examples of vulnerabilities of the given class can be potentially detected at each company in the future."
ERPScan is offering a free program that can detect the vulnerabilities.
Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.