Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Directory traversal in external billing interface, SAP security note 1785662

Description

Billing via the internal billing interface (reports RVAFSS00, RVAFSS01 und RVAFSS02) contains a vulnerability through which an attacker can potentially read arbitrary files on the remote server, possibly disclosing confidential information.

Available fix and Supported packages

  • SAP_APPL | 31I | 31I
  • SAP_APPL | 40B | 40B
  • SAP_APPL | 45B | 45B
  • SAP_APPL | 46B | 46B
  • SAP_APPL | 46C | 46C
  • SAP_APPL | 470 | 470
  • SAP_APPL | 500 | 500
  • SAP_APPL | 600 | 600
  • SAP_APPL | 602 | 602
  • SAP_APPL | 603 | 603
  • SAP_APPL | 604 | 604
  • SAP_APPL | 605 | 605
  • SAP_APPL | 606 | 606
  • SAP_APPL | 616 | 616
  • SAP_APPL 31I | SAPKH31IB9 |
  • SAP_APPL 40B | SAPKH40B89 |
  • SAP_APPL 45B | SAPKH45B67 |
  • SAP_APPL 46B | SAPKH46B62 |
  • SAP_APPL 470 | SAPKH47039 |
  • SAP_APPL 500 | SAPKH50028 |
  • SAP_APPL 600 | SAPKH60023 |
  • SAP_APPL 602 | SAPKH60213 |
  • SAP_APPL 603 | SAPKH60312 |
  • SAP_APPL 604 | SAPKH60413 |
  • SAP_APPL 605 | SAPKH60510 |
  • SAP_APPL 606 | SAPKH60606 |
  • SAP_APPL 616 | SAPKH61601 |
  • SAP_APPL 46C | SAPKH46C66 |

Affected component

    SD-BIL-IV-IF
    External Billing

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected].

URL

https://launchpad.support.sap.com/#/notes/1785662

TAGS

#Directory-traversal
#RVAFSS00
#RVAFSS01
#RVAFSS02
#billing-document
#invoice
#billing

More to explorer