mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-02 03:30:48 +00:00
25 lines
1.2 KiB
Markdown
25 lines
1.2 KiB
Markdown
![]() |
### [CVE-2022-39802](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39802)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
SAP Manufacturing Execution - versions 15.1, 15.2, 15.3, allows an attacker to exploit insufficient validation of a file path request parameter. The intended file path can be manipulated to allow arbitrary traversal of directories on the remote server. The file content within each directory can be read which may lead to information disclosure.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- http://packetstormsecurity.com/files/168716/SAP-Manufacturing-Execution-Core-15.3-Path-Traversal.html
|
||
|
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/k0mi-tg/CVE-POC
|
||
|
- https://github.com/manas3c/CVE-POC
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/redrays-io/CVE-2022-39802
|
||
|
- https://github.com/whoforget/CVE-POC
|
||
|
- https://github.com/youwizard/CVE-POC
|
||
|
|