Skip links

Directory traversal in SAP Product and REACH Compliance, SAP security note 1513492

Description


Read-only directory traversal

SAP Product and REACH Compliance contains a vulnerability through which a malicious user can potentially read arbitrary files on the remote server, possibly disclosing confidential information.

Read-write or write directory traversal

SAP Product and REACH Compliance contains a vulnerability through which a malicious user can potentially write arbitrary files on the remote server, possibly corrupting data or altering system behavior.

Available fix and Supported packages

  • TDAGBCA | 110_500 | 110_500
  • TDAGBCA | 110_600 | 110_600
  • TDAGBCA | 200_500 | 200_500
  • TDAGBCA | 200_600 | 200_600
  • TDAGBCA 200_600 | SAPK-36002INTDAGBCA |
  • TDAGBCA 200_500 | SAPK-35002INTDAGBCA |
  • TDAGBCA 110_500 | SAPK-25005INTDAGBCA |
  • TDAGBCA 110_600 | SAPK-26005INTDAGBCA |

Affected component

    EHS-SRC
    SAP Product and REACH Compliance

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1513492

TAGS

#PRC-2.0-SP02
#Product-and-REACH-Compliance-2.0-Support-Package-02
#REACHSAP-RC-1.1-SP05
#SAP-REACH-Compliance-1.1-Support-Package-05
#DI
#discrete-industryDirectory-traversal
#path-traversal
#transaction-FILE
#XX-PART-SRC

How to detect over 4100 vulnerabilities in SAP Systems?

More to explorer

Initiating SAP Penetration Testing

►   Pentest, short for penetration testing, refers to a set of processes that simulate an attacker’s actions to identify security vulnerabilities. Companies

SAP Security Patch Day RedRays

May 2024 SAP Security Patch Day

Vulnerability: Multiple vulnerabilities in SAP CX Commerce SAP Component: CEC-SCC-PLA-PL CVE ID: CVE-2019-17495 CVSS Score: 9.8 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Category: Program error