Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Directory Traversal vulnerability in CO-PA-TO, SAP security note 2318953

Description

CO-PA-TO allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs.

Some well-known impacts of Directory Traversal vulnerability are –

  • attacker could read content of arbitrary files on the remote server and expose sensitive data
  • attacker could overwrite, delete, or corrupt arbitrary files on the remote server 

Available fix and Supported packages

  • SAP_APPL | 600 | 600
  • SAP_APPL | 602 | 602
  • SAP_APPL | 603 | 603
  • SAP_APPL | 604 | 604
  • SAP_APPL | 605 | 605
  • SAP_APPL | 606 | 606
  • SAP_APPL | 616 | 616
  • SAP_FIN | 617 | 617
  • SAP_FIN | 618 | 618
  • SAP_FIN | 700 | 700
  • SAP_FIN | 720 | 720
  • SAP_FIN | 730 | 730
  • S4CORE | 100 | 100
  • SAP_APPL 600 | SAPKH60029 |
  • SAP_APPL 602 | SAPKH60219 |
  • SAP_APPL 603 | SAPKH60318 |
  • SAP_APPL 604 | SAPKH60419 |
  • SAP_APPL 605 | SAPKH60516 |
  • SAP_APPL 606 | SAPKH60618 |
  • SAP_APPL 616 | SAPKH61611 |
  • SAP_FIN 617 | SAPK-61712INSAPFIN |
  • SAP_FIN 700 | SAPK-70009INSAPFIN |
  • SAP_FIN 720 | SAPK-72005INSAPFIN |
  • SAP_FIN 618 | SAPK-61803INSAPFIN |
  • SAP_FIN 730 | SAPK-73004INSAPFIN |
  • | SAPK-S4CLOUD_1608 |
  • S4CORE 100 | SAPK-10003INS4CORE |

Affected component

    CO-PA-TO
    Tools

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2318953

TAGS

#Path-traversal
#backtracking
#directory-climbing&65279

Explore More

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.