Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential directory traversals in applications, SAP security note 1543851

Description

Potential directory traversals in applications using physical file names or logical file names as input.
This note provides the additional correction instructions which need to be applied in case you decide not to import the transport request as described in note 1497003. As mentioned in note 1497003 SAP recommends that you import the transport request in order to avoid issues with copy & paste errors or other errors related to manual application or creation of corrections and objects.

Available fix and Supported packages

  • SAP_APPL | 31I | 31I
  • SAP_APPL | 40B | 40B
  • SAP_APPL | 45B | 45B
  • SAP_BASIS | 46B | 46C
  • SAP_BASIS | 620 | 640
  • SAP_BASIS | 700 | 702
  • SAP_BASIS | 710 | 730
  • SAP_BASIS | 72L | 800

Affected component

    BC-CCM-FIL
    Platform independent file names

CVSS

Score: 0

Exploit

Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/1543851

TAGS

#path-traversal
#FILE_VALIDATE_NAME
#FILE_GET_NAME
#FILE
#SF01
#FILE_NOT_FOUND
#LOGICAL_FILENAME_NOT_FOUND
#VALIDATION_FAILED
#SG-001
#805
#806
#807
#808
#809

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,