Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Directory Traversal in batch input reports in class system, SAP security note 1512352

Description

This security note has been updated. For details, see Security Notes 1555924 and 1691201.

An error in the batch input report of the classification contains a vulnerability through which a malicious user can
potentially read and write arbitrary files on the remote server, possibly corrupting data or altering system behavior.

Available fix and Supported packages

  • SAP_APPL | 31I | 31I
  • SAP_APPL | 40B | 40B
  • SAP_APPL | 45B | 45B
  • SAP_APPL | 46B | 46B
  • SAP_APPL | 46C | 46C
  • SAP_ABA | 620 | 620
  • SAP_ABA | 640 | 640
  • SAP_ABA | 700 | 702
  • SAP_ABA | 710 | 711
  • SAP_ABA | 730 | 730
  • SAP_APPL 31I | SAPKH31IB9 |
  • SAP_APPL 40B | SAPKH40B89 |
  • SAP_APPL 45B | SAPKH45B67 |
  • SAP_APPL 46B | SAPKH46B62 |
  • SAP_APPL 46C | SAPKH46C62 |
  • SAP_ABA 730 | SAPKA73002 |
  • SAP_ABA 620 | SAPKA62070 |
  • SAP_ABA 710 | SAPKA71012 |
  • SAP_ABA 702 | SAPKA70207 |
  • SAP_ABA 711 | SAPKA71107 |
  • SAP_ABA 640 | SAPKA64028 |
  • SAP_ABA 700 | SAPKA70024 |
  • SAP_ABA 701 | SAPKA70109 |

Affected component

    CA-CL
    Classification

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1512352

TAGS

#directory
#traversal

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,

Protect Your SAP with RedRays Security Platform

Explore the Power of Our Scanner with an Interactive Prototype Below