This module exploits the CVE-2020-6207 vulnerability within the SAP EEM servlet (tc~smd~agent~application~eem) of SAP Solution Manager (SolMan) running version 7.2. The vulnerability occurs due to missing authentication checks when submitting SOAP requests to the /EemAdminService/EemAdmin page to get information about connected SMDAgents, send HTTP request (SSRF), and execute OS commands on connected SMDAgent. Works stable in connected SMDAgent with Java version 1.8. Successful exploitation of the vulnerability enables unauthenticated remote attackers to achieve SSRF and execute OS commands from the agent connected to SolMan as a user from which the SMDAgent service starts, usually the daaadm.
SAP Solution Manager Missing Authentication Check Complete Compromise of SMD Agents vulnerability
SAP Solution Manager remote unauthorized OS commands execution
SAP Solution Manager Remote Code Execution (CVE-2020-6207)
SAP Solution Manager 7.2 Remote Command Execution
Beware! Fully-Functional Exploit Released Online for SAP Solution Manager Flaw
Exploit for Missing Authentication for Critical Function in Sap Solution Manager
SAP Bugs Under Active Cyberattack