Skip links

[CVE-2021-44232] Directory Traversal vulnerability in SAF-T Framework, SAP security note 3124094

Description

Symptom

SAF-T Framework Transaction SAFTN_G allows an attacker to exploit insufficient validation of path information provided by normal user, leading to full server directory access. The attacker can see the whole filesystem structure but cannot overwrite, delete, or corrupt arbitrary files on the server.

Other Terms

Path traversal, backtrackingdirectory climbing, CVE-2021-44232

Solution

The F4 search help of field File Name in transaction SAFTN_G will be removed. There are still three possibilities for end-users to enter the file name:

Either manually enter the full path and file name (e.g.: /tmp/saft.xml) in the SAFTN_G File Name field. SAF-T will use this full path and file name to create xml file.

Or assign Physical Path to Logical File Path “SAFTN_FILE_PATH” and assign Physical File Name of Logical File Name “SAFTN_FILE_NAME” in transaction FILE in advance. SAF-T will detect and use the corresponding full path and file name to create xml file.

Or assign Physical Path to Logical File Path “SAFTN_FILE_PATH” in advance. In the transaction SAFTN_G, end-user only needs to manually enter the file name without path (e.g.: saft.xml) in the File Name field. SAF-T will detect and use the corresponding full path and file name to create xml file. 

Available fix and Supported packages

SAP_APPL|600|600|
SAP_APPL|602|602|
SAP_APPL|603|603|
SAP_APPL|604|604|
SAP_APPL|605|605|
SAP_APPL|606|606|
SAP_FIN|617|617|
SAP_FIN|618|618|
SAP_FIN|720|720|
SAP_FIN|730|730|
S4CORE|101|101|
S4CORE|102|102|
S4CORE|103|103|
S4CORE|104|104|
S4CORE|105|105|
S4CORE|106|106|
 
Affected component

SAP_APPL

CVSS

Score:7.7
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/3124094

TAGS

Path traversal, backtrackingdirectory climbing, CVE-2021-44232