Skip links

Directory Traversal in class system reports, SAP security note 1587531

Description

The reports in classification contain a vulnerability through which a malicious user can potentially write arbitrary files on the remote server, possibly corrupting data or altering system behavior.

Available fix and Supported packages

  • SAP_APPL | 31I | 31I
  • SAP_APPL | 40B | 40B
  • SAP_APPL | 45B | 45B
  • SAP_APPL | 46B | 46B
  • SAP_APPL | 46C | 46C
  • SAP_ABA | 620 | 620
  • SAP_ABA | 640 | 640
  • SAP_ABA | 700 | 702
  • SAP_ABA | 710 | 711
  • SAP_ABA | 730 | 730
  • SAP_APPL 31I | SAPKH31IB9 |
  • SAP_APPL 40B | SAPKH40B89 |
  • SAP_APPL 45B | SAPKH45B67 |
  • SAP_APPL 46B | SAPKH46B62 |
  • SAP_APPL 46C | SAPKH46C63 |
  • SAP_ABA 700 | SAPKA70025 |
  • SAP_ABA 710 | SAPKA71013 |
  • SAP_ABA 701 | SAPKA70110 |
  • SAP_ABA 711 | SAPKA71108 |
  • SAP_ABA 702 | SAPKA70209 |
  • SAP_ABA 730 | SAPKA73004 |
  • SAP_ABA 620 | SAPKA62071 |
  • SAP_ABA 640 | SAPKA64029 |

Affected component

    CA-CL
    Classification

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1587531

TAGS

#directory
#traversal

SAP Security platform overview

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,