{"id":28488,"date":"2017-09-21T08:00:29","date_gmt":"2017-09-21T06:00:29","guid":{"rendered":"http:\/\/e3mag.com\/?p=28488"},"modified":"2022-05-01T09:01:03","modified_gmt":"2022-05-01T07:01:03","slug":"damage-averted-by-wannacry-petya-co","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/schaden-durch-wannacry-petya-co-abwenden\/","title":{"rendered":"Avert damage from WannaCry, Petya, &amp; Co."},"content":{"rendered":"<p>SAP HotNews, SAP TopNotes, SAP Security Notes and SAP Legal Change Notes help the tens of thousands of SAP customers proactively avoid problems and risks or resolve them as quickly as possible.<\/p>\n<p>Even with mobile apps, users are usually automatically informed about new versions of applications that not only extend functionality, but also solve known problems and close security gaps. Unfortunately, this is not the case with most open source components!<\/p><div id=\"great-3951993649\" class=\"great-fullsize-content-en great-entity-placement\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6ZGXMPyM-nU\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"banner_26-04_29_1200x150\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3.jpg\" alt=\"\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26-04_29_1200x150-3-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<h3>Threats beyond the radar<\/h3>\n<p>Here, the trade and daily press usually only reports and warns about current threats when hundreds of thousands of systems have already been affected and\/or major damage has been done.<\/p>\n<p>Software developers have to inform themselves laboriously and time-consumingly about current and new versions and become active. This becomes even more difficult when open source components are themselves built into other components, which is often the case.<\/p>\n<p>Therefore, unlike the \"prominently\" featured cases of WannaCry and Petya, most truly critical threats are not even on the radar of most IT managers.<\/p>\n<p><a href=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/Ralf-Meyer.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"Avert damage from wannacry, petya, &amp; co.\" class=\"aligncenter size-full wp-image-28490\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/Ralf-Meyer.jpg\" alt=\"Ralf Meyer\" width=\"800\" height=\"545\" srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/Ralf-Meyer.jpg 800w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/Ralf-Meyer-768x523.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/Ralf-Meyer-100x68.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/Ralf-Meyer-480x327.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/Ralf-Meyer-640x436.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/Ralf-Meyer-720x491.jpg 720w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<h3>Current examples<\/h3>\n<p>\"Spring\" is one of the most widely used Java frameworks. Few companies in the SAP community are likely to use Java without Spring, and over 10,000 open source software packages are based on it. Version 4.3.4 was released only eight months ago, but it is vulnerable and thus a major gateway for potential attackers.<\/p>\n<p>\"Struts2\" is also heavily used, for example with SAP CrystalReports, the SAP JCO, jQuery, and is highly vulnerable.<\/p>\n<p>Hardly any Java application does not use Apache Common Beanutils, for example in the SAP Hana Cloud environment. Here, virtually every version before 1.9.2 is vulnerable and therefore risky for users.<\/p>\n<p>The good news: There is an automatic and free monitoring solution. VersionEye from the Mannheim-based start-up of the same name offers a kind of \"OpenSourceNotes\" as a supplement to the well-established \"SAPnotes\" and is itself 100 percent open source (under MIT license).<\/p>\n<p>Today, more than 1.4 million open source projects are already monitored, developed in 16 different programming languages, such as Java, Java-Script, PHP and \"R\" (the important language for Hana).<\/p>\n<p>More than 45,000 registered users and 500,000 monthly visitors (worldwide) are already using this service to actively minimize risks from open source software.<\/p>\n<p>VersionEye informs 24 x 7 automatically and actively about new versions of Open Source components (\"Version Notes\"), possible license problems (\"License Notes\") and security risks (\"Security Notes\").<\/p>\n<p>And not according to the \"shotgun principle\", but specifically only for the open source components that are really affected and also used by the user.<\/p>\n<h3>Made in Germany and free of charge<\/h3>\n<p>In contrast to similar, expensive and proprietary US services, no customer code is transferred to servers in the USA either. Since VersionEye itself is 100 percent open source software, the solution is completely transparent and can be analyzed and also adapted if necessary.<\/p>\n<p>Enterprise services are offered for the implementation of best practices in the use of open source in the SAP ecosystem, seamless integration in enterprise environments and service level agreements. Enterprise customers include Blinkist, Seeburger and Xing.<\/p>","protected":false},"excerpt":{"rendered":"<p>The SAP community is different from other software ecosystems and has been used to automatically receiving up-to-date and reliable information from Walldorf as \"SAPnotes\" on problems and risks in SAP systems for decades. <\/p>","protected":false},"author":1984,"featured_media":28489,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[5,16508],"tags":[90,188,369,92,506,1633,3491,7150,15800],"coauthors":[37235],"class_list":["post-28488","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-management","category-mag-1709","tag-apps","tag-hana-cloud","tag-it","tag-java","tag-open-source","tag-sap-community","tag-sap-hana","tag-sicherheitsluecken","tag-wannacry","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",1000,491,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",400,196,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193-768x377.jpg",768,377,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",1000,491,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193-100x49.jpg",100,49,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193-480x236.jpg",480,236,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193-640x314.jpg",640,314,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193-720x354.jpg",720,354,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193-960x471.jpg",960,471,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",1000,491,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",1000,491,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",1000,491,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",1000,491,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",1000,491,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",18,9,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",1000,491,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",1000,491,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",1000,491,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",600,295,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193.jpg",600,295,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2017\/09\/shutterstock_233436193-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Die SAP-Community ist anders als die anderen Software\u00f6kosysteme und seit Jahrzehnten gewohnt, automatisch aus Walldorf aktuelle und verl\u00e4ssliche Informationen als \u201eSAPnotes\u201c zu Problemen und Risiken in SAP-Systemen zu erhalten. <\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/it-management\/\" rel=\"category tag\">IT-Management<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag-1709\/\" rel=\"category tag\">MAG 17-09<\/a>","author_info_v2":{"name":"Ralf Meyer, Synomic","url":"https:\/\/e3mag.com\/en\/author\/ralf-meyer-synomic\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/28488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/1984"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=28488"}],"version-history":[{"count":0,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/28488\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/28489"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=28488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=28488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=28488"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=28488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}