CVE-2019-0304
📋 TL;DR
CVE-2019-0304 is a critical command injection vulnerability in the FTP function of SAP NetWeaver AS ABAP Platform that allows attackers to execute arbitrary code on affected systems. This affects multiple kernel versions across 32-bit and 64-bit architectures. Organizations running vulnerable SAP NetWeaver installations are at risk of complete system compromise.
💻 Affected Systems
- SAP NetWeaver AS ABAP Platform
📦 What is this software?
Advanced Business Application Programming Platform Kernel by Sap
View all CVEs affecting Advanced Business Application Programming Platform Kernel →
Advanced Business Application Programming Platform Kernel by Sap
View all CVEs affecting Advanced Business Application Programming Platform Kernel →
Advanced Business Application Programming Platform Kernel by Sap
View all CVEs affecting Advanced Business Application Programming Platform Kernel →
Advanced Business Application Programming Platform Kernel by Sap
View all CVEs affecting Advanced Business Application Programming Platform Kernel →
Advanced Business Application Programming Platform Kernel by Sap
View all CVEs affecting Advanced Business Application Programming Platform Kernel →
Advanced Business Application Programming Platform Krnl32nuc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl32nuc →
Advanced Business Application Programming Platform Krnl32nuc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl32nuc →
Advanced Business Application Programming Platform Krnl32nuc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl32nuc →
Advanced Business Application Programming Platform Krnl32nuc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl32nuc →
Advanced Business Application Programming Platform Krnl32uc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl32uc →
Advanced Business Application Programming Platform Krnl32uc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl32uc →
Advanced Business Application Programming Platform Krnl32uc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl32uc →
Advanced Business Application Programming Platform Krnl32uc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl32uc →
Advanced Business Application Programming Platform Krnl64nuc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl64nuc →
Advanced Business Application Programming Platform Krnl64nuc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl64nuc →
Advanced Business Application Programming Platform Krnl64nuc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl64nuc →
Advanced Business Application Programming Platform Krnl64nuc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl64nuc →
Advanced Business Application Programming Platform Krnl64nuc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl64nuc →
Advanced Business Application Programming Platform Krnl64uc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl64uc →
Advanced Business Application Programming Platform Krnl64uc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl64uc →
Advanced Business Application Programming Platform Krnl64uc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl64uc →
Advanced Business Application Programming Platform Krnl64uc by Sap
View all CVEs affecting Advanced Business Application Programming Platform Krnl64uc →
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover with administrative privileges, data exfiltration, lateral movement within the network, and persistent backdoor installation.
Likely Case
Remote code execution leading to application compromise, data theft, and potential ransomware deployment.
If Mitigated
Limited impact if proper network segmentation, least privilege, and monitoring are in place, though exploitation could still occur.
🎯 Exploit Status
CWE-74 indicates improper neutralization of special elements in output used by a downstream component, making exploitation straightforward for attackers with network access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply SAP Security Note 2719530
Vendor Advisory: https://launchpad.support.sap.com/#/notes/2719530
Restart Required: Yes
Instructions:
1. Download and apply SAP Security Note 2719530. 2. Update SAP kernel to patched version. 3. Restart affected SAP systems. 4. Verify patch application through transaction SM51.
🔧 Temporary Workarounds
Disable FTP Service
allTemporarily disable FTP functionality if not required for business operations.
Modify SAP profile parameter: rdisp/ftp_enable = 0
Restart SAP instance
Network Access Control
allRestrict network access to SAP FTP ports (default 21212/tcp) using firewall rules.
iptables -A INPUT -p tcp --dport 21212 -j DROP
netsh advfirewall firewall add rule name="Block SAP FTP" dir=in action=block protocol=TCP localport=21212
🧯 If You Can't Patch
- Implement strict network segmentation to isolate SAP systems from untrusted networks
- Deploy application-level firewalls or WAF with command injection protection rules
- Enable detailed logging and monitoring for FTP-related activities
- Apply principle of least privilege to SAP service accounts
🔍 How to Verify
Check if Vulnerable:
Check SAP kernel version via transaction SM51 or SM50, compare against affected versions list.
Check Version:
In SAP GUI: System → Status → Other Kernel Information
Verify Fix Applied:
Verify SAP Security Note 2719530 is applied via transaction SNOTE, check kernel version is updated.
📡 Detection & Monitoring
Log Indicators:
- Unusual FTP connection attempts
- Command execution patterns in SAP logs
- Failed authentication attempts to FTP service
Network Indicators:
- Traffic to SAP FTP port 21212 with unusual payloads
- Command injection patterns in network traffic
SIEM Query:
source="sap_logs" AND ("FTP" OR "21212") AND ("command" OR "injection" OR "exec")