Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

Potential directory traversals in PA-PA-US, SAP security note 1620339

Description

Write directory traversals in PA-PA-US contain a vulnerability through which a malicious user can potentially write arbitrary files on the remote server, possibly corrupting data or altering system behaviour.

Available fix and Supported packages

  • SAP_HR | 46C | 46C
  • SAP_HRCUS | 470 | 470
  • SAP_HRCUS | 500 | 500
  • SAP_HRCUS | 600 | 600
  • SAP_HRCUS | 604 | 604
  • EA-HRCUS | 200 | 200
  • EA-HRCUS | 500 | 500
  • EA-HRCUS | 600 | 600
  • EA-HRCUS | 602 | 602
  • EA-HRCUS | 603 | 603
  • EA-HRCUS | 604 | 604
  • EA-HRCUS | 605 | 605
  • EA-HRCUS | 606 | 606
  • SAP_HR 46C | SAPKE46CH9 |
  • SAP_HRCUS 600 | SAPK-60073INSAPHRCUS |
  • SAP_HRCUS 604 | SAPK-60439INSAPHRCUS |
  • SAP_HRCUS 470 | SAPK-470C4INSAPHRCUS |
  • SAP_HRCUS 500 | SAPK-50090INSAPHRCUS |
  • EA-HRCUS 602 | SAPK-60252INEAHRCUS |
  • EA-HRCUS 600 | SAPK-60073INEAHRCUS |
  • EA-HRCUS 603 | SAPK-60347INEAHRCUS |
  • EA-HRCUS 604 | SAPK-60439INEAHRCUS |
  • EA-HRCUS 605 | SAPK-60516INEAHRCUS |
  • EA-HRCUS 200 | SAPK-200A5INEAHRCUS |
  • EA-HRCUS 500 | SAPK-50090INEAHRCUS |

Affected component

    PA-PA-US
    USA

CVSS

Score: 0

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/1620339

TAGS

#Directory-traversal
#component-PA-PA-US

More to explorer