Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

CVE-2020-6203 Path Manipulation in SAP NetWeaver UDDI Server(Services Registry), SAP security note 2806198

Description

Services Registry allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs.

Some well-known impacts of Directory Traversal vulnerability are –

  • attacker could read content of arbitrary files on the remote server and expose sensitive data
  • attacker could overwrite, delete, or corrupt arbitrary files on the remote server 

Available fix and Supported packages

  • SR-UI | 7.11 | 7.11
  • SR-UI | 7.20 | 7.20
  • SR-UI | 7.30 | 7.30
  • SR-UI | 7.31 | 7.31
  • SR-UI | 7.40 | 7.40
  • SR-UI | 7.50 | 7.50
  • SR UI 7.11 | SP018 | 000001
  • SR UI 7.11 | SP019 | 000001
  • SR UI 7.11 | SP020 | 000000
  • SR UI 7.20 | SP009 | 000004
  • SR UI 7.30 | SP014 | 000002
  • SR UI 7.30 | SP015 | 000002
  • SR UI 7.30 | SP016 | 000002
  • SR UI 7.30 | SP017 | 000001
  • SR UI 7.30 | SP018 | 000001
  • SR UI 7.30 | SP019 | 000001
  • SR UI 7.30 | SP020 | 000000
  • SR UI 7.30 | SP021 | 000000
  • SR UI 7.31 | SP020 | 000001
  • SR UI 7.31 | SP021 | 000001
  • SR UI 7.31 | SP022 | 000001
  • SR UI 7.31 | SP023 | 000001
  • SR UI 7.31 | SP024 | 000001
  • SR UI 7.31 | SP025 | 000000
  • SR UI 7.31 | SP026 | 000000
  • SR UI 7.31 | SP027 | 000000

Affected component

    BC-ESI-UDDI
    UDDI Server

CVSS

Score: 9.1
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/2806198

TAGS

#Path-traversal
#&160-backtracking
#&160-directory-climbing&65279
#CVE-2020-6203

Explore More

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.