Description
Symptom
SAF-T Framework Transaction SAFTN_G allows an attacker to exploit insufficient validation of path information provided by normal user, leading to full server directory access. The attacker can see the whole filesystem structure but cannot overwrite, delete, or corrupt arbitrary files on the server.
Other Terms
Path traversal, backtracking, directory climbing, CVE-2021-44232
Solution
The F4 search help of field File Name in transaction SAFTN_G will be removed. There are still three possibilities for end-users to enter the file name:
Either manually enter the full path and file name (e.g.: /tmp/saft.xml) in the SAFTN_G File Name field. SAF-T will use this full path and file name to create xml file.
Or assign Physical Path to Logical File Path “SAFTN_FILE_PATH” and assign Physical File Name of Logical File Name “SAFTN_FILE_NAME” in transaction FILE in advance. SAF-T will detect and use the corresponding full path and file name to create xml file.
Available fix and Supported packages
SAP_APPL|602|602|
SAP_APPL|603|603|
SAP_APPL|604|604|
SAP_APPL|605|605|
SAP_APPL|606|606|
SAP_FIN|617|617|
SAP_FIN|618|618|
SAP_FIN|720|720|
SAP_FIN|730|730|
S4CORE|101|101|
S4CORE|102|102|
S4CORE|103|103|
S4CORE|104|104|
S4CORE|105|105|
S4CORE|106|106|
SAP_APPL
CVSS
Score:7.7
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Exploit
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/3124094