{"uuid": "2883c305-3104-49b3-ad78-7423eaf0d2d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-17571", "type": "seen", "source": "https://t.me/anwar1213xx/1757", "content": "\u0645\u0644\u062d\u0645\u0629 Log4J \u0644\u064a\u0633\u062a \u0623\u0642\u0644 \u0645\u0646 \u0639\u0627\u0635\u0641\u0629 \u0645\u062b\u0627\u0644\u064a\u0629 \u0644\u0644\u0645\u062a\u0633\u0644\u0644\u064a\u0646 \u0645\u0646 \u062c\u0645\u064a\u0639 \u0627\u0644\u0645\u0634\u0627\u0631\u0628 \u060c \u0648\u0648\u0641\u0642\u064b\u0627 \u0644\u0631\u0626\u064a\u0633 CISA \u060c \u0633\u064a\u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u062b\u063a\u0631\u0627\u062a Log4j \u0644\u0644\u062a\u0637\u0641\u0644 \u0641\u064a \u0627\u0644\u0645\u0633\u062a\u0642\u0628\u0644 \u060c \u0644\u0623\u0646\u0647 \u0625\u0630\u0627 \u0627\u0633\u062a\u062e\u062f\u0645 \u0627\u0644\u0645\u062a\u0633\u0644\u0644\u0648\u0646 Log4shell \u060c \u0641\u0642\u062f \u0644\u0627 \u0646\u0639\u0631\u0641 \u0639\u0646\u0647\u0627 \u0628\u0639\u062f.\n \n\u0645\u062c\u0631\u062f \u0627\u0644\u062a\u0641\u0643\u064a\u0631 \u060c 32 \u062a\u0637\u0628\u064a\u0642\u064b\u0627 \u0645\u0646 \u0634\u0631\u0643\u0629 SAP \u0627\u0644\u0623\u0644\u0645\u0627\u0646\u064a\u0629 \u0644\u0635\u0646\u0627\u0639\u0629 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0627\u0633\u062a\u062e\u062f\u0645\u062a \u0645\u0643\u062a\u0628\u0629 Apache Log4j \u0627\u0644\u0636\u0639\u064a\u0641\u0629. \u062a\u0645\u0643\u0646\u062a SAP \u0645\u0646 \u0625\u0635\u0644\u0627\u062d \u0639\u062f\u062f \u0642\u0644\u064a\u0644 \u0645\u0646\u0647\u0627 \u060c \u062d\u064a\u062b \u0623\u0635\u062f\u0631\u062a \u0627\u0644\u0645\u062c\u0645\u0648\u0639\u0629 \u0627\u0644\u0623\u0648\u0644\u0649 \u0645\u0646 \u062a\u062d\u062f\u064a\u062b\u0627\u062a \u0627\u0644\u0623\u0645\u0627\u0646 \u0641\u064a \u0639\u0627\u0645 2022.\n \n\u0643\u062c\u0632\u0621 \u0645\u0646 \u064a\u0648\u0645 \u0627\u0644\u062a\u0635\u062d\u064a\u062d \u060c \u0623\u0639\u0644\u0646\u062a SAP \u0639\u0646 \u0625\u0635\u062f\u0627\u0631 \u0645\u0627 \u0645\u062c\u0645\u0648\u0639\u0647 11 \u0645\u0644\u0627\u062d\u0638\u0629 \u0623\u0645\u0646\u064a\u0629 \u062c\u062f\u064a\u062f\u0629 \u060c \u0628\u0627\u0644\u0625\u0636\u0627\u0641\u0629 \u0625\u0644\u0649 16 \u0645\u0644\u0627\u062d\u0638\u0629 \u0625\u0636\u0627\u0641\u064a\u0629 \u0648\u062b\u0644\u0627\u062b\u0629 \u062a\u062d\u062f\u064a\u062b\u0627\u062a \u0644\u0644\u0645\u0644\u0627\u062d\u0638\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0645 \u0625\u0635\u062f\u0627\u0631\u0647\u0627 \u0645\u0633\u0628\u0642\u064b\u0627 \u060c \u0648\u0625\u0635\u0644\u0627\u062d \u0627\u0644\u0623\u062e\u0637\u0627\u0621 \u0641\u064a \u0625\u062c\u0645\u0627\u0644\u064a 21 \u062a\u0637\u0628\u064a\u0642\u064b\u0627.\n \n\u062a\u062a\u0639\u0644\u0642 \u0623\u0647\u0645 \u0625\u0634\u0639\u0627\u0631\u0627\u062a \u0627\u0644\u0623\u0645\u0627\u0646 \u0647\u0630\u0647 \u0628\u0645\u0643\u0648\u0646 Log4j \u0627\u0644\u0636\u0639\u064a\u0641 \u060c \u0628\u0645\u0627 \u0641\u064a \u0630\u0644\u0643 \u0645\u0634\u0643\u0644\u0629 \u0642\u062f\u064a\u0645\u0629 \u0645\u0648\u062c\u0648\u062f\u0629 \u0641\u064a \u0625\u0635\u062f\u0627\u0631 \u0633\u0627\u0628\u0642 \u0645\u0646 \u0627\u0644\u0645\u0643\u062a\u0628\u0629 \u060c \u062a\u0645 \u062a\u062a\u0628\u0639\u0647\u0627 \u0643\u0640 CVE-2019-17571 (\u062f\u0631\u062c\u0629 CVSS 9.8).\n \n\u0645\u0644\u0627\u062d\u0638\u0629 \u0623\u0645\u0646\u064a\u0629 \u0645\u0647\u0645\u0629 \u0623\u062e\u0631\u0649 (\u062f\u0631\u062c\u0629 CVSS \u062a\u0628\u0644\u063a 8.7) \u062a\u0645 \u0646\u0634\u0631\u0647\u0627 \u0628\u0648\u0627\u0633\u0637\u0629 SAP \u0647\u0630\u0627 \u0627\u0644\u0623\u0633\u0628\u0648\u0639 \u062a\u062a\u0639\u0644\u0642 \u0628\u0627\u0644\u0628\u0631\u0645\u062c\u0629 \u0627\u0644\u0646\u0635\u064a\u0629 \u0639\u0628\u0631 \u0627\u0644\u0645\u0648\u0627\u0642\u0639 (XSS) \u0648\u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u0641\u064a \u0625\u062f\u062e\u0627\u0644 \u0627\u0644\u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0629 \u0641\u064a S / 4HANA \u0648\u0627\u0644\u062a\u064a \u062a\u0648\u062c\u062f \u0628\u0633\u0628\u0628 \u0639\u062f\u0645 \u0642\u064a\u0627\u0645 \u0627\u0644\u062a\u0637\u0628\u064a\u0642 \u0628\u0627\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0635\u062d\u0629 \u0627\u0644\u0645\u0644\u0641\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0645 \u062a\u062d\u0645\u064a\u0644\u0647\u0627 \u0648\u062a\u0646\u0632\u064a\u0644\u0647\u0627.\n \n\u062a\u0633\u0645\u062d \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u0627\u0644\u0623\u0648\u0644\u0649 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0627\u0644\u0630\u064a \u064a\u062a\u0645\u062a\u0639 \u0628\u062d\u0642\u0648\u0642 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629 \u0628\u062a\u0634\u063a\u064a\u0644 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u0639\u0634\u0648\u0627\u0626\u064a\u0629 \u060c \u0645\u0645\u0627 \u064a\u0624\u062f\u064a \u0625\u0644\u0649 \u0627\u0644\u0643\u0634\u0641 \u0639\u0646 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0623\u0648 \u062a\u0639\u062f\u064a\u0644\u0647\u0627.\n \n\u0648\u0627\u0644\u062b\u0627\u0646\u064a \u064a\u0633\u0645\u062d \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0627\u0644\u0630\u064a \u064a\u062a\u0645\u062a\u0639 \u0628\u062d\u0642\u0648\u0642 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645 \u0627\u0644\u0623\u0633\u0627\u0633\u064a\u0629 \u0628\u062d\u0642\u0646 \u0645\u062d\u062a\u0648\u0649 \u062e\u0637\u064a\u0631 \u0623\u0648 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u0636\u0627\u0631\u0629 \u064a\u0645\u0643\u0646\u0647\u0627 \u062a\u063a\u064a\u064a\u0631 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u062d\u0633\u0627\u0633\u0629 \u0623\u0648 \u062a\u0639\u0631\u064a\u0636 \u062a\u0648\u0641\u0631 \u0627\u0644\u062a\u0637\u0628\u064a\u0642 \u0644\u0644\u062e\u0637\u0631 \u0628\u0634\u0643\u0644 \u0643\u0627\u0645\u0644.\n \n\u0643\u0645\u0627 \u0623\u0646\u0647 \u064a\u0635\u0644\u062d \u0623\u062e\u0637\u0627\u0621 \u0627\u0644\u0643\u0634\u0641 \u0639\u0646 \u0645\u0639\u0644\u0648\u0645\u0627\u062a Business One \u060c \u0648\u062e\u0637\u0623 Enterprise Threat Detection XSS \u060c \u0648\u0645\u0634\u0643\u0644\u0629 \u0627\u0644\u0643\u0634\u0641 \u0639\u0646 \u0645\u0639\u0644\u0648\u0645\u0627\u062a NetWeaver \u060c \u0648\u0643\u0644\u0647\u0627 \u0645\u062a\u0648\u0633\u0637\u0629 \u0627\u0644\u062e\u0637\u0648\u0631\u0629.\n \n\u0628\u0627\u0644\u0625\u0636\u0627\u0641\u0629 \u0625\u0644\u0649 \u0630\u0644\u0643 \u060c \u0642\u0627\u0645\u062a \u0627\u0644\u0634\u0631\u0643\u0629 \u0628\u062a\u062d\u062f\u064a\u062b \u0625\u0635\u0644\u0627\u062d\u0627\u062a 3 \u062f\u064a\u0633\u0645\u0628\u0631 \u0627\u0644\u0633\u0627\u0628\u0642\u0629 \u0644\u0623\u062e\u0637\u0627\u0621 \u0625\u062f\u062e\u0627\u0644 \u0627\u0644\u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0629 \u0641\u064a NetWeaver AS ABAP \u060c \u0648\u0627\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0635\u062d\u0629 \u0627\u0644\u0625\u062f\u062e\u0627\u0644 \u063a\u064a\u0631 \u0627\u0644\u0635\u062d\u064a\u062d \u0641\u064a 3D Visual Enterprise Viewer \u060c \u0648\u0641\u0642\u062f\u0627\u0646 \u0627\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0627\u0644\u062a\u0641\u0648\u064a\u0636 \u0641\u064a GRC Access Control.\n \n\u062a\u062a\u062d\u062f\u062b \u0647\u0630\u0647 \u0627\u0644\u0645\u062c\u0645\u0648\u0639\u0629 \u0627\u0644\u062c\u0627\u062f\u0629 \u0645\u0646 \u0627\u0644\u0625\u0635\u0644\u0627\u062d\u0627\u062a \u0639\u0646 \u0645\u0634\u0627\u0643\u0644 \u062e\u0637\u064a\u0631\u0629 \u0628\u0646\u0641\u0633 \u0627\u0644\u0642\u062f\u0631 \u0633\u064a\u062a\u0639\u064a\u0646 \u0639\u0644\u0649 \u0627\u0644\u0635\u0646\u0627\u0639\u0629 \u0645\u0648\u0627\u062c\u0647\u062a\u0647\u0627 \u0641\u064a \u0627\u0644\u0645\u0633\u062a\u0642\u0628\u0644. \u0644\u0643\u0646\u0646\u0627 \u062d\u0630\u0631\u0646\u0627 \u0628\u0627\u0644\u0641\u0639\u0644 \u0645\u0646 \u0630\u0644\u0643.\n\n@Hack_4x\n\n@anwar1213anwar", "creation_timestamp": "2022-02-17T21:10:19.000000Z"}