Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-6203


SAP NetWeaver UDDI Server (Services Registry), versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs, leading to Path Traversal.


Published

2020-03-10T21:15:14.417

Last Modified

2024-11-21T05:35:17.523

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 9.1 (CRITICAL)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

4.9

Weaknesses
  • Type: Primary
    CWE-22

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application sap netweaver 7.10 Yes
Application sap netweaver 7.11 Yes
Application sap netweaver 7.20 Yes
Application sap netweaver 7.30 Yes
Application sap netweaver 7.31 Yes
Application sap netweaver 7.40 Yes
Application sap netweaver 7.50 Yes

References