Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Directory traversal with unauthorized modification in BW, SAP security note 1658759

Description

BW-BEX-ET-WEB contains a vulnerability through which a malicious user can potentially read arbitrary files. It can be abused by a malicious user, allowing them to modify displayed application content without authorization, and to potentially obtain authentication information from other legitimate users.

Available fix and Supported packages

  • SAP_BW | 30B | 30B
  • SAP_BW | 310 | 310
  • SAP_BW | 350 | 350
  • SAP_BW | 700 | 702
  • SAP_BW | 710 | 730
  • SAP_BW | 731 | 731
  • SAP_BW_VIRTUAL_COMP | 711 | 711
  • SAP_BW 30B | SAPKW30B34 |
  • SAP_BW 350 | SAPKW35030 |
  • SAP_BW 700 | SAPKW70029 |
  • SAP_BW 701 | SAPKW70112 |
  • SAP_BW 711 | SAPKW71110 |
  • SAP_BW 702 | SAPKW70212 |
  • SAP_BW 730 | SAPKW73008 |
  • SAP_BW 731 | SAPKW73104 |
  • SAP_BW_VIRTUAL_COMP 711 | SAPK-71134INVCBWTECH |

Affected component

    BW-BEX-ET-WEB
    BEx Web ABAP Runtime

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1658759

TAGS

#Reflected-cross-site-scripting
#XSS
#directory-traveral
#BW-BEX-ET-WEB

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,

Protect Your SAP with RedRays Security Platform

Explore the Power of Our Scanner with an Interactive Prototype Below