Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

[CVE-2021-44232] Directory Traversal vulnerability in SAF-T Framework, SAP security note 3124094

Description

Symptom

SAF-T Framework Transaction SAFTN_G allows an attacker to exploit insufficient validation of path information provided by normal user, leading to full server directory access. The attacker can see the whole filesystem structure but cannot overwrite, delete, or corrupt arbitrary files on the server.

Other Terms

Path traversal, backtrackingdirectory climbing, CVE-2021-44232

Solution

The F4 search help of field File Name in transaction SAFTN_G will be removed. There are still three possibilities for end-users to enter the file name:

Either manually enter the full path and file name (e.g.: /tmp/saft.xml) in the SAFTN_G File Name field. SAF-T will use this full path and file name to create xml file.

Or assign Physical Path to Logical File Path “SAFTN_FILE_PATH” and assign Physical File Name of Logical File Name “SAFTN_FILE_NAME” in transaction FILE in advance. SAF-T will detect and use the corresponding full path and file name to create xml file.

Or assign Physical Path to Logical File Path “SAFTN_FILE_PATH” in advance. In the transaction SAFTN_G, end-user only needs to manually enter the file name without path (e.g.: saft.xml) in the File Name field. SAF-T will detect and use the corresponding full path and file name to create xml file. 

Available fix and Supported packages

SAP_APPL|600|600|
SAP_APPL|602|602|
SAP_APPL|603|603|
SAP_APPL|604|604|
SAP_APPL|605|605|
SAP_APPL|606|606|
SAP_FIN|617|617|
SAP_FIN|618|618|
SAP_FIN|720|720|
SAP_FIN|730|730|
S4CORE|101|101|
S4CORE|102|102|
S4CORE|103|103|
S4CORE|104|104|
S4CORE|105|105|
S4CORE|106|106|
 
Affected component

SAP_APPL

CVSS

Score:7.7
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Exploit


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/3124094

TAGS

Path traversal, backtrackingdirectory climbing, CVE-2021-44232

More to explorer

RedRays at Black Hat MEA 2023

🔒 “FROM ON-PREMISES TO CLOUD: A COMPREHENSIVE ANALYSIS OF SAP SECURITY ISSUES” 🔒 📅 17:40, Wed, Nov 15📍 Briefing Stage 4 At

SAP Security For All

RedRays Security Platform for Penetration testers and Bug hunters

The product package is specifically created for cyber security experts who have encountered SAP while participating in bug bounty programs.

RedRays Security Platform for SAP Consultants

The product package is designed for SAP consultants conducting security assessments of SAP ERP systems. We provide essential tools and resources to help professionals in this field conduct their work effectively.

RedRays Security Platform for Enterprises

The product package is specifically optimized to cater to the needs of both small/medium and large companies who are seeking to streamline the process of organizing a comprehensive security system for ERP systems.