mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 10:41:43 +00:00
26 lines
1.1 KiB
Markdown
26 lines
1.1 KiB
Markdown
![]() |
### [CVE-2018-2380](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2380)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
SAP CRM, 7.01, 7.02,7.30, 7.31, 7.33, 7.54, allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing "traverse to parent directory" are passed through to the file APIs.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/
|
||
|
- https://github.com/erpscanteam/CVE-2018-2380
|
||
|
- https://www.exploit-db.com/exploits/44292/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/20142995/sectool
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/Ostorlab/KEV
|
||
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
|