{"id":1135,"date":"2020-05-05T12:36:16","date_gmt":"2020-05-05T10:36:16","guid":{"rendered":"https:\/\/sast-blog.akquinet.com\/?p=1135"},"modified":"2020-07-24T11:19:49","modified_gmt":"2020-07-24T09:19:49","slug":"sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui","status":"publish","type":"post","link":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/","title":{"rendered":"SAP home goes rogue \u2013 preventable attack vectors through the SAP GUI"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-1137 alignleft\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware-300x206.jpg\" alt=\"SAST Blog: SAP Home Goes Rogue \u2013 Preventable Attack Vectors Through the SAP GUI\" width=\"300\" height=\"206\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware-300x206.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware.jpg 640w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>In most cases, enterprise networks are infected as a result of human error. Employees click on spoofed links, accidentally reveal their passwords to third parties, or open a file that contains unexpected malware. In attack vectors involving the SAP GUI, employees are often not to blame, because an incorrectly configured SAP system is enough to enable damage to the IT landscape.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h2>A Proof of Concept attack works like this:<\/h2>\n<p>A PoC hack \u2013 opening a manipulated PDF file, for example \u2013 the Windows user name and password hashes can be easily extracted. Once the password hashes have been localized, it is simple to find out the user&#8217;s real Windows password. The <a href=\"https:\/\/github.com\/deepzec\/Bad-Pdf\" target=\"_blank\" rel=\"noopener noreferrer\">bad PDF hack<\/a> was published for the first time in May 2018 and then presented in 2019 at the Chaos Computer Club <a href=\"https:\/\/media.ccc.de\/v\/gpn19-45-badpdf-stealing-windows-credentials-via-pdf-files\" target=\"_blank\" rel=\"noopener noreferrer\">goulash programming night<\/a>.<\/p>\n<p>Fast forward to today, where a client that has not been updated with a bug fix can be easily exploited via the SAP GUI. The image of the Easy Access menu that every SAP user sees upon logon can be replaced by other files. In this case, SAP users have no choice whether or not they want to display the file \u2013 with far-reaching consequences.<\/p>\n<p>This attack works in all SAP systems, even SAP S\/4HANA environments. It can be carried out on a development system and then be spread to any production systems through transport management. No further authorizations in the production system are needed for this. The only prerequisite is access to transactions SMW0 and SM30 \u2013 which are standard in a development system.<\/p>\n<p>Step 1: Generation of a prepared PDF file with the Python code from the GitHub repository.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1136\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik1.jpg\" alt=\"SAST Blog: SAP Home Goes Rogue \u2013 Preventable Attack Vectors Through the SAP GUI\" width=\"489\" height=\"490\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik1.jpg 588w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik1-300x300.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik1-150x150.jpg 150w\" sizes=\"auto, (max-width: 489px) 100vw, 489px\" \/><\/p>\n<p>Step 2: Copy the PDF to the local computer and log on to the SAP system.<\/p>\n<p>Step 3: Start transaction SMW0. The prepared PDF is uploaded with MIME type application\/pdf. It only needs to be saved locally.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1138\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik2.jpg\" alt=\"SAST Blog: SAP Home Goes Rogue \u2013 Preventable Attack Vectors Through the SAP GUI\" width=\"585\" height=\"176\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik2.jpg 745w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik2-300x90.jpg 300w\" sizes=\"auto, (max-width: 585px) 100vw, 585px\" \/><\/p>\n<p>Step 4: After the PDF is uploaded, it is integrated in the start page of the Easy Access menu, using transaction SM30 and table SSM_CUST. The START_IMAGE parameter is set to the uploaded PDF.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1139\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik3.jpg\" alt=\"SAST Blog: SAP Home Goes Rogue \u2013 Preventable Attack Vectors Through the SAP GUI\" width=\"505\" height=\"342\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik3.jpg 605w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik3-300x203.jpg 300w\" sizes=\"auto, (max-width: 505px) 100vw, 505px\" \/><\/p>\n<p>Step 5: As a result of the set parameter, the SAP GUI now tries to display the PDF every time an SAP user logs on. The process itself remains undetectable to the user.<\/p>\n<p>The PDF is supposed to be displayed on the right side of the Easy Access menu, but since it doesn&#8217;t, the page simply remains blank.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1140\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik4-1024x662.jpg\" alt=\"SAST Blog: SAP Home Goes Rogue \u2013 Preventable Attack Vectors Through the SAP GUI\" width=\"596\" height=\"385\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik4-1024x662.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik4-300x194.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik4-768x496.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik4.jpg 1063w\" sizes=\"auto, (max-width: 596px) 100vw, 596px\" \/><\/p>\n<p>Step 6: The mere attempt to execute the PDF delivers the desired results for the attacker: The Windows user and password hash are transmitted. In fact, the SAP GUI even tries to display the PDF several times.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1142\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik5.jpg\" alt=\"SAST Blog: SAP Home Goes Rogue \u2013 Preventable Attack Vectors Through the SAP GUI\" width=\"597\" height=\"185\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik5.jpg 677w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik5-300x93.jpg 300w\" sizes=\"auto, (max-width: 597px) 100vw, 597px\" \/><\/p>\n<h2>How can you protect your SAP systems against attack vectors through the SAP GUI?<\/h2>\n<p>The only comprehensive protection is to monitor table SSM_CUST for changes constantly. The\u00a0<strong><a href=\"https:\/\/sast-solutions.de\/sap-security-intelligence.html\" target=\"_blank\" rel=\"noopener noreferrer\">SAST Security Radar<\/a><\/strong>\u00a0solution can assume this monitoring task for you, reporting any changes to the responsible people at your company immediately.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-1141\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik6-1024x124.jpg\" alt=\"SAST Blog: SAP Home Goes Rogue \u2013 Preventable Attack Vectors Through the SAP GUI\" width=\"764\" height=\"93\" srcset=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik6-1024x124.jpg 1024w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik6-300x36.jpg 300w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik6-768x93.jpg 768w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik6-1536x186.jpg 1536w, https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog-Bad-PDF-Hack_Markus_Grafik6.jpg 1937w\" sizes=\"auto, (max-width: 764px) 100vw, 764px\" \/><\/p>\n<p><strong>SAST Security Radar<\/strong>\u00a0helps you to respond to critical cases in real time by monitoring change documents for your tables, among other objects, and assesses their criticality. Modified tables can be identified immediately.<\/p>\n<p>Do you want to learn more about securing your SAP systems with SAST Security Radar? Visit our\u00a0<a href=\"https:\/\/sast-solutions.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SAST SOLUTIONS website<\/a>\u00a0or\u00a0<a href=\"mailto:sast@akquinet.de\" target=\"_blank\" rel=\"noopener noreferrer\">just get in touch<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1143\" src=\"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Markus-Rest_SAST-SOLUTIONS.jpg\" alt=\"Markus Rest (SAST SOLUTIONS)\" width=\"180\" height=\"216\" \/><br \/>\n<strong>Markus Rest (SAST-SUITE Development)<\/strong><\/p>\n<p>Disclaimer:<\/p>\n<p>The example above is intended for demonstration purposes only. If you wish to reproduce it at all, you should only do so in a secure environment. AKQUINET assumes no liability for any damages that may result from the use of this information.<\/p>\n<p>&nbsp;<\/p>\n<h2>This might also be of interest to you:<\/h2>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/12\/03\/rethinking-real-time-monitoring-for-it-security-with-the-internet-of-things\/\">Rethinking real-time monitoring for IT security with the Internet of Things<\/a><\/p>\n<p><a href=\"https:\/\/sast-blog.akquinet.com\/2019\/11\/21\/important-elements-of-a-cybersecurity-strategy\/\">The most important elements of a cybersecurity strategy<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In most cases, enterprise networks are infected as a result of human error. Employees click on spoofed links, accidentally reveal their passwords to third parties, or open a file that contains unexpected malware. In attack vectors involving the SAP GUI, employees are often not to blame, because an incorrectly configured SAP system is enough to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[25,156,58,80,114],"class_list":["post-1135","post","type-post","status-publish","format-standard","hentry","category-sap-security","tag-cyber-attack","tag-cyber-security","tag-real-time-monitoring","tag-sap-security","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SAP Home Goes Rogue: Preventable Attack Vectors Through the SAP GUI<\/title>\n<meta name=\"description\" content=\"For attack vectors through the SAP GUI, an incorrectly configured SAP system is enough to enable damage to the IT landscape. The SAST Security Radar helps.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SAP Home Goes Rogue: Preventable Attack Vectors Through the SAP GUI\" \/>\n<meta property=\"og:description\" content=\"For attack vectors through the SAP GUI, an incorrectly configured SAP system is enough to enable damage to the IT landscape. The SAST Security Radar helps.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/\" \/>\n<meta property=\"og:site_name\" content=\"SAST BLOG\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-05T10:36:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-24T09:19:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"securityblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"SAP Home Goes Rogue: Preventable Attack Vectors Through the SAP GUI\" \/>\n<meta name=\"twitter:description\" content=\"For attack vectors through the SAP GUI, an incorrectly configured SAP system is enough to enable damage to the IT landscape. The SAST Security Radar helps.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"securityblog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/05\\\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/05\\\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\\\/\"},\"author\":{\"name\":\"securityblog\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\"},\"headline\":\"SAP home goes rogue \u2013 preventable attack vectors through the SAP GUI\",\"datePublished\":\"2020-05-05T10:36:16+00:00\",\"dateModified\":\"2020-07-24T09:19:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/05\\\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\\\/\"},\"wordCount\":633,\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/05\\\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Blog_SAP-Home-goes_Malware-300x206.jpg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Real-time monitoring\",\"SAP Security\",\"Threat Detection\"],\"articleSection\":[\"SAP Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/05\\\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/05\\\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\\\/\",\"name\":\"SAP Home Goes Rogue: Preventable Attack Vectors Through the SAP GUI\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/05\\\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/05\\\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Blog_SAP-Home-goes_Malware-300x206.jpg\",\"datePublished\":\"2020-05-05T10:36:16+00:00\",\"dateModified\":\"2020-07-24T09:19:49+00:00\",\"description\":\"For attack vectors through the SAP GUI, an incorrectly configured SAP system is enough to enable damage to the IT landscape. The SAST Security Radar helps.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/05\\\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/05\\\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/05\\\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Blog_SAP-Home-goes_Malware-300x206.jpg\",\"contentUrl\":\"https:\\\/\\\/sast-blog.akquinet.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Blog_SAP-Home-goes_Malware-300x206.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/2020\\\/05\\\/05\\\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SAP home goes rogue \u2013 preventable attack vectors through the SAP GUI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#website\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"name\":\"SAST BLOG\",\"description\":\"SAP Security &amp; Compliance\",\"publisher\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#organization\",\"name\":\"SAST BLOG\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"contentUrl\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/sast-solutions-logo.png\",\"width\":358,\"height\":155,\"caption\":\"SAST BLOG\"},\"image\":{\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sast-solutions.com\\\/blog-en\\\/#\\\/schema\\\/person\\\/cd70e3749cca136a7e8a37dc1d3cfc26\",\"name\":\"securityblog\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SAP Home Goes Rogue: Preventable Attack Vectors Through the SAP GUI","description":"For attack vectors through the SAP GUI, an incorrectly configured SAP system is enough to enable damage to the IT landscape. The SAST Security Radar helps.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/","og_locale":"en_US","og_type":"article","og_title":"SAP Home Goes Rogue: Preventable Attack Vectors Through the SAP GUI","og_description":"For attack vectors through the SAP GUI, an incorrectly configured SAP system is enough to enable damage to the IT landscape. The SAST Security Radar helps.","og_url":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/","og_site_name":"SAST BLOG","article_published_time":"2020-05-05T10:36:16+00:00","article_modified_time":"2020-07-24T09:19:49+00:00","og_image":[{"width":640,"height":440,"url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware.jpg","type":"image\/jpeg"}],"author":"securityblog","twitter_card":"summary_large_image","twitter_title":"SAP Home Goes Rogue: Preventable Attack Vectors Through the SAP GUI","twitter_description":"For attack vectors through the SAP GUI, an incorrectly configured SAP system is enough to enable damage to the IT landscape. The SAST Security Radar helps.","twitter_image":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware.jpg","twitter_misc":{"Written by":"securityblog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/#article","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/"},"author":{"name":"securityblog","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26"},"headline":"SAP home goes rogue \u2013 preventable attack vectors through the SAP GUI","datePublished":"2020-05-05T10:36:16+00:00","dateModified":"2020-07-24T09:19:49+00:00","mainEntityOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/"},"wordCount":633,"publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware-300x206.jpg","keywords":["Cyber Attack","Cyber Security","Real-time monitoring","SAP Security","Threat Detection"],"articleSection":["SAP Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/","url":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/","name":"SAP Home Goes Rogue: Preventable Attack Vectors Through the SAP GUI","isPartOf":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/#primaryimage"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/#primaryimage"},"thumbnailUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware-300x206.jpg","datePublished":"2020-05-05T10:36:16+00:00","dateModified":"2020-07-24T09:19:49+00:00","description":"For attack vectors through the SAP GUI, an incorrectly configured SAP system is enough to enable damage to the IT landscape. The SAST Security Radar helps.","breadcrumb":{"@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/#primaryimage","url":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware-300x206.jpg","contentUrl":"https:\/\/sast-blog.akquinet.com\/wp-content\/uploads\/2020\/05\/Blog_SAP-Home-goes_Malware-300x206.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sast-solutions.com\/blog-en\/2020\/05\/05\/sap-home-goes-rogue-preventable-attack-vectors-through-sap-gui\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sast-solutions.com\/blog-en\/"},{"@type":"ListItem","position":2,"name":"SAP home goes rogue \u2013 preventable attack vectors through the SAP GUI"}]},{"@type":"WebSite","@id":"https:\/\/sast-solutions.com\/blog-en\/#website","url":"https:\/\/sast-solutions.com\/blog-en\/","name":"SAST BLOG","description":"SAP Security &amp; Compliance","publisher":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sast-solutions.com\/blog-en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sast-solutions.com\/blog-en\/#organization","name":"SAST BLOG","url":"https:\/\/sast-solutions.com\/blog-en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/","url":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","contentUrl":"https:\/\/sast-solutions.com\/blog-en\/wp-content\/uploads\/2021\/03\/sast-solutions-logo.png","width":358,"height":155,"caption":"SAST BLOG"},"image":{"@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/sast-solutions.com\/blog-en\/#\/schema\/person\/cd70e3749cca136a7e8a37dc1d3cfc26","name":"securityblog"}]}},"_links":{"self":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/comments?post=1135"}],"version-history":[{"count":17,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1135\/revisions"}],"predecessor-version":[{"id":1235,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/posts\/1135\/revisions\/1235"}],"wp:attachment":[{"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/media?parent=1135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/categories?post=1135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sast-solutions.com\/blog-en\/wp-json\/wp\/v2\/tags?post=1135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}