- Description
- SAP NetWeaver UDDI Server (Services Registry), versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs, leading to Path Traversal.
- Source
- cna@sap.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 9.1
- Impact score
- 5.2
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
- Severity
- CRITICAL
CVSS 3.0
- Type
- Secondary
- Base score
- 9.1
- Impact score
- 6
- Exploitability score
- 2.3
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:N
- nvd@nist.gov
- CWE-22
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sap:netweaver:7.10:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EDFFDB95-B956-4B22-81F4-A4074D49D4A8"
},
{
"criteria": "cpe:2.3:a:sap:netweaver:7.11:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "21A3F6A8-B060-48CE-841F-698F8F779191"
},
{
"criteria": "cpe:2.3:a:sap:netweaver:7.20:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "53B11A3B-C559-428C-8946-7FD9FFBFA1BC"
},
{
"criteria": "cpe:2.3:a:sap:netweaver:7.30:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "606EFE4F-57A4-44E2-A98D-F0867A658218"
},
{
"criteria": "cpe:2.3:a:sap:netweaver:7.31:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FECD5E96-7669-4747-80D2-27F95BF420BC"
},
{
"criteria": "cpe:2.3:a:sap:netweaver:7.40:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F019F7F5-7740-4BD4-850F-D7A1923C6200"
},
{
"criteria": "cpe:2.3:a:sap:netweaver:7.50:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F2B37045-2FB7-49BB-AE38-B84FAA6ADFB0"
}
],
"operator": "OR"
}
]
}
]