cve/2020/CVE-2020-6203.md

19 lines
948 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-6203](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6203)
![](https://img.shields.io/static/v1?label=Product&message=SAP%20NetWeaver%20UDDI%20Server%20(Services%20Registry)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C7.10%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Path%20Traversal&color=brighgreen)
### Description
SAP NetWeaver UDDI Server (Services Registry), versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs, leading to Path Traversal.
### POC
#### Reference
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
2024-06-09 00:33:16 +00:00
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=540935305
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.