SAF-T Framework Transaction SAFTN_G allows an attacker to exploit insufficient validation of path information provided by normal user, leading to full server directory access. The attacker can see the whole filesystem structure but cannot overwrite, delete, or corrupt arbitrary files on the server.
Path traversal, backtracking, directory climbing, CVE-2021-44232
The F4 search help of field File Name in transaction SAFTN_G will be removed. There are still three possibilities for end-users to enter the file name:
Either manually enter the full path and file name (e.g.: /tmp/saft.xml) in the SAFTN_G File Name field. SAF-T will use this full path and file name to create xml file.
Or assign Physical Path to Logical File Path “SAFTN_FILE_PATH” and assign Physical File Name of Logical File Name “SAFTN_FILE_NAME” in transaction FILE in advance. SAF-T will detect and use the corresponding full path and file name to create xml file.
Available fix and Supported packages
Exploit is not available.
For detailed information please contact the mail [email protected]