CVE-2020-6203 Path Manipulation in SAP NetWeaver UDDI Server(Services Registry), SAP security note 2806198
Description
Services Registry allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs.
Some well-known impacts of Directory Traversal vulnerability are –
- attacker could read content of arbitrary files on the remote server and expose sensitive data
- attacker could overwrite, delete, or corrupt arbitrary files on the remote server
Available fix and Supported packages
- SR-UI | 7.11 | 7.11
- SR-UI | 7.20 | 7.20
- SR-UI | 7.30 | 7.30
- SR-UI | 7.31 | 7.31
- SR-UI | 7.40 | 7.40
- SR-UI | 7.50 | 7.50
- SR UI 7.11 | SP018 | 000001
- SR UI 7.11 | SP019 | 000001
- SR UI 7.11 | SP020 | 000000
- SR UI 7.20 | SP009 | 000004
- SR UI 7.30 | SP014 | 000002
- SR UI 7.30 | SP015 | 000002
- SR UI 7.30 | SP016 | 000002
- SR UI 7.30 | SP017 | 000001
- SR UI 7.30 | SP018 | 000001
- SR UI 7.30 | SP019 | 000001
- SR UI 7.30 | SP020 | 000000
- SR UI 7.30 | SP021 | 000000
- SR UI 7.31 | SP020 | 000001
- SR UI 7.31 | SP021 | 000001
- SR UI 7.31 | SP022 | 000001
- SR UI 7.31 | SP023 | 000001
- SR UI 7.31 | SP024 | 000001
- SR UI 7.31 | SP025 | 000000
- SR UI 7.31 | SP026 | 000000
- SR UI 7.31 | SP027 | 000000
Affected component
- BC-ESI-UDDI
UDDI Server
CVSS
Score: 9.1
CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Exploit
Exploit is not available.
For detailed information please contact the mail [email protected]
URL
https://launchpad.support.sap.com/#/notes/2806198