Description
CO-PA-TO allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs.
Some well-known impacts of Directory Traversal vulnerability are –
- attacker could read content of arbitrary files on the remote server and expose sensitive data
- attacker could overwrite, delete, or corrupt arbitrary files on the remote server
Available fix and Supported packages
- SAP_APPL | 600 | 600
- SAP_APPL | 602 | 602
- SAP_APPL | 603 | 603
- SAP_APPL | 604 | 604
- SAP_APPL | 605 | 605
- SAP_APPL | 606 | 606
- SAP_APPL | 616 | 616
- SAP_FIN | 617 | 617
- SAP_FIN | 618 | 618
- SAP_FIN | 700 | 700
- SAP_FIN | 720 | 720
- SAP_FIN | 730 | 730
- S4CORE | 100 | 100
- SAP_APPL 600 | SAPKH60029 |
- SAP_APPL 602 | SAPKH60219 |
- SAP_APPL 603 | SAPKH60318 |
- SAP_APPL 604 | SAPKH60419 |
- SAP_APPL 605 | SAPKH60516 |
- SAP_APPL 606 | SAPKH60618 |
- SAP_APPL 616 | SAPKH61611 |
- SAP_FIN 617 | SAPK-61712INSAPFIN |
- SAP_FIN 700 | SAPK-70009INSAPFIN |
- SAP_FIN 720 | SAPK-72005INSAPFIN |
- SAP_FIN 618 | SAPK-61803INSAPFIN |
- SAP_FIN 730 | SAPK-73004INSAPFIN |
- | SAPK-S4CLOUD_1608 |
- S4CORE 100 | SAPK-10003INS4CORE |
Affected component
- CO-PA-TO
Tools
CVSS
Score: 0
PoC
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/2318953