Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

Directory traversal with unauthorized modification in BW, SAP security note 1658759

Description

BW-BEX-ET-WEB contains a vulnerability through which a malicious user can potentially read arbitrary files. It can be abused by a malicious user, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users.

Available fix and Supported packages

  • SAP_BW | 30B | 30B
  • SAP_BW | 310 | 310
  • SAP_BW | 350 | 350
  • SAP_BW | 700 | 702
  • SAP_BW | 710 | 730
  • SAP_BW | 731 | 731
  • SAP_BW_VIRTUAL_COMP | 711 | 711
  • SAP_BW 30B | SAPKW30B34 |
  • SAP_BW 350 | SAPKW35030 |
  • SAP_BW 700 | SAPKW70029 |
  • SAP_BW 701 | SAPKW70112 |
  • SAP_BW 711 | SAPKW71110 |
  • SAP_BW 702 | SAPKW70212 |
  • SAP_BW 730 | SAPKW73008 |
  • SAP_BW 731 | SAPKW73104 |
  • SAP_BW_VIRTUAL_COMP 711 | SAPK-71134INVCBWTECH |

Affected component

    BW-BEX-ET-WEB
    BEx Web ABAP Runtime

CVSS

Score: 0

PoC

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1658759

TAGS

#Reflected-cross-site-scripting
#XSS
#directory-traveral
#BW-BEX-ET-WEB

More to explorer

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.