Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

IS-H AT Directory Traversal in various reports, SAP security note 1519061

Description

This note was previously released as a functional note.

If you have already implemented this note, you do not need to implement it again.

This note is relevant for country version AT (Austria) only.

Potential directory traversal in the following programs:

  • RNWATICD10
  • RNWATMELMAP
  • RNWATSCO50
  • RNWAT_SCO_MSG_LOAD

Also in the following programs in IS-H Version 6.05:

  • RNUEZG50
  • RNUICD50
  • RNUPLZ50
  • RNWATSTERNKR_LOAD

Available fix and Supported packages

  • IS-H | 472 | 472
  • IS-H | 600 | 600
  • IS-H | 602 | 602
  • IS-H | 603 | 603
  • IS-H | 604 | 604
  • IS-H | 605 | 605
  • IS-H 605 | SAPK-60504INISH |
  • IS-H 600 | SAPK-60025INISH |
  • IS-H 602 | SAPK-60214INISH |
  • IS-H 603 | SAPK-60314INISH |
  • IS-H 604 | SAPK-60415INISH |
  • IS-H 472 | SAPKIPHF41 |
  • IS-H 605 | SAPK-60506INISH |

Affected component

    XX-CSC-AT-IS-H
    Hospital

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1519061

TAGS

#Directory-traversal
#RNWATICD10
#RNWATMELMAP
#RNWATSCO50
#RNWAT_SCO_MSG_LOAD

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,