cve/2023/CVE-2023-29186.md

18 lines
995 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-29186](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29186)
![](https://img.shields.io/static/v1?label=Product&message=NetWeaver%20(BI%20CONT%20ADDON)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20707%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-22%3A%20Improper%20Limitation%20of%20a%20Pathname%20to%20a%20Restricted%20Directory%20('Path%20Traversal')&color=brighgreen)
### Description
In SAP NetWeaver (BI CONT ADDON) - versions 707, 737, 747, 757, an attacker can exploit a directory traversal flaw in a report to upload and overwrite files on the SAP server. Data cannot be read but if a remote attacker has sufficient (administrative) privileges then potentially critical OS files can be overwritten making the system unavailable.
### POC
#### Reference
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
#### Github
No PoCs found on GitHub currently.