Skip to content

theogobinet/SAPanonGWv3

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

SAPanonGWv3

This project is based on SAP_GW_RCE_exploit and specifically on SAPanonGWv2.py. It addresses the issue of retrieving output by the last packet by downgrading the SAPCPIC version from 2 to 1.

How to install

To use this exploit, PySAP must be modified to include the xpg_end definition in the SAPCPIC class (found in SAPRFC.py).

Add the following line at line 791 in SAPRFC.py:

ConditionalField(PacketField("xpg_end", None, SAPRFXPG_END), lambda pkt: pkt.cpic_RFC_f in ['SAPXPG_END_XPG']),

Additional Features

  • Added a --route (-r) option to allow exploitation through an SAP Router.

About

SAP Gateway RCE exploit

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages