Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Directory Traversal in Dynpro Processing, SAP security note 1522643

Description

Dynpro Processing contains a vulnerability through which a malicious user can potentially read arbitrary files on the remote server, possibly disclosing con-fidential information.

Available fix and Supported packages

  • SAP_APPL | 31I | 31I
  • SAP_APPL | 40B | 40B
  • SAP_APPL | 45B | 45B
  • SAP_BASIS | 46B | 46C
  • SAP_BASIS | 610 | 640
  • SAP_BASIS | 700 | 702
  • SAP_BASIS | 710 | 730
  • SAP_BASIS | 72L | 72L
  • SAP_APPL 31I | SAPKH31IB9 |
  • SAP_APPL 40B | SAPKH40B89 |
  • SAP_APPL 45B | SAPKH45B67 |
  • SAP_BASIS 46B | SAPKB46B62 |
  • SAP_BASIS 730 | SAPKB73001 |
  • SAP_BASIS 702 | SAPKB70206 |
  • SAP_BASIS 46C | SAPKB46C62 |
  • SAP_BASIS 730 | SAPKB73002 |
  • SAP_BASIS 620 | SAPKB62070 |
  • SAP_BASIS 710 | SAPKB71012 |
  • SAP_BASIS 702 | SAPKB70207 |
  • SAP_BASIS 711 | SAPKB71107 |
  • SAP_BASIS 720 | SAPKB72005 |
  • SAP_BASIS 640 | SAPKB64028 |
  • SAP_BASIS 700 | SAPKB70024 |
  • SAP_BASIS 701 | SAPKB70109 |

Affected component

    BC-ABA-LA
    Syntax, Compiler, Runtime

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1522643

TAGS

#directory
#traversal
#Dynpro-Processing

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,