Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Directory traversal when creating conditions (batch input), SAP security note 1620983

Description

Creating a batch input session for condition records (report RV14BTCI) contains a vulnerability through which an attacker can potentially read arbitrary files on the remote server, possibly disclosing confidential information.

Available fix and Supported packages

  • SAP_APPL | 31I | 31I
  • SAP_APPL | 40B | 40B
  • SAP_APPL | 45B | 45B
  • SAP_APPL | 46B | 46B
  • SAP_APPL | 46C | 46C
  • SAP_APPL | 470 | 470
  • SAP_APPL | 500 | 500
  • SAP_APPL | 600 | 600
  • SAP_APPL | 602 | 602
  • SAP_APPL | 603 | 603
  • SAP_APPL | 604 | 604
  • SAP_APPL | 605 | 605
  • SAP_APPL | 606 | 606
  • SAP_APPL 31I | SAPKH31IB9 |
  • SAP_APPL 40B | SAPKH40B89 |
  • SAP_APPL 45B | SAPKH45B67 |
  • SAP_APPL 46B | SAPKH46B62 |
  • SAP_APPL 46C | SAPKH46C63 |
  • SAP_APPL 470 | SAPKH47037 |
  • SAP_APPL 500 | SAPKH50026 |
  • SAP_APPL 606 | SAPKH60601 |
  • SAP_APPL 600 | SAPKH60021 |
  • SAP_APPL 602 | SAPKH60211 |
  • SAP_APPL 603 | SAPKH60310 |
  • SAP_APPL 604 | SAPKH60411 |
  • SAP_APPL 605 | SAPKH60507 |

Affected component

    SD-MD-CM
    Conditions and Condition Maintainance

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1620983

TAGS

#Directory-traversal
#RV14BTCI
#RVBTCI01
#RVBTCI02
#condition-technique
#condition-maintenance
#condition-records
#OPEN-DATASET
#CONDITION_BATCH_ROOT-CONDITION_BATCH_FILENAME

More to explorer