Описание
saposcol in SAP R/3 Web Application Server Demo before 1.5 trusts the PATH environmental variable to find and execute the expand program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse expand program.
Ссылки
- ExploitPatchVendor Advisory
- PatchVendor Advisory
- ExploitPatchVendor Advisory
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.5 (включая)
Одно из
cpe:2.3:a:sap:sap_r_3_web_application_server_demo:*:*:*:*:*:*:*:*
cpe:2.3:a:sap:saposcol:1.0:*:linux:*:*:*:*:*
cpe:2.3:a:sap:saposcol:1.1:*:linux:*:*:*:*:*
cpe:2.3:a:sap:saposcol:1.2:*:linux:*:*:*:*:*
cpe:2.3:a:sap:saposcol:1.3:*:linux:*:*:*:*:*
EPSS
Процентиль: 14%
0.00047
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other
Связанные уязвимости
github
больше 3 лет назад
saposcol in SAP R/3 Web Application Server Demo before 1.5 trusts the PATH environmental variable to find and execute the expand program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse expand program.
EPSS
Процентиль: 14%
0.00047
Низкий
7.2 High
CVSS2
Дефекты
NVD-CWE-Other