Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-6225

Опубликовано: 14 апр. 2020
Источник: nvd
CVSS3: 9.1
CVSS3: 8.8
CVSS2: 6.5
EPSS Низкий

Описание

SAP NetWeaver (Knowledge Management), versions (KMC-CM - 7.00, 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 and KMC-WPC 7.30, 7.31, 7.40, 7.50), does not sufficiently validate path information provided by users, thus characters representing traverse to parent directory are passed through to the file APIs, allowing the attacker to overwrite, delete, or corrupt arbitrary files on the remote server, leading to Path Traversal.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\(kmc-cm\):7.00:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\(kmc-cm\):7.01:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\(kmc-cm\):7.02:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\(kmc-cm\):7.30:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\(kmc-cm\):7.31:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\(kmc-cm\):7.40:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\(kmc-cm\):7.50:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\(kmc-wpc\):7.30:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\(kmc-wpc\):7.31:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\(kmc-wpc\):7.40:*:*:*:*:*:*:*
cpe:2.3:a:sap:netweaver_knowledge_management_and_collaboration_\(kmc-wpc\):7.50:*:*:*:*:*:*:*

EPSS

Процентиль: 67%
0.00537
Низкий

9.1 Critical

CVSS3

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-22

Связанные уязвимости

github
больше 3 лет назад

SAP NetWeaver (Knowledge Management), versions (KMC-CM - 7.00, 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 and KMC-WPC 7.30, 7.31, 7.40, 7.50), does not sufficiently validate path information provided by users, thus characters representing traverse to parent directory are passed through to the file APIs, allowing the attacker to overwrite, delete, or corrupt arbitrary files on the remote server, leading to Path Traversal.

EPSS

Процентиль: 67%
0.00537
Низкий

9.1 Critical

CVSS3

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-22