CVE-2018-2367
Summary
| CVE | CVE-2018-2367 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-03-01 17:29:00 UTC |
| Updated | 2018-03-23 16:44:00 UTC |
| Description | ABAP File Interface in, SAP BASIS, from 7.00 to 7.02, from 7.10 to 7.11, 7.30, 7.31, 7.40, from 7.50 to 7.52, allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing "traverse to parent directory" are passed through to the file APIs. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Sap | Business Application Software Integrated Solution | 7.30 | All | All | All |
| Application | Sap | Business Application Software Integrated Solution | 7.31 | All | All | All |
| Application | Sap | Business Application Software Integrated Solution | 7.40 | All | All | All |
| Application | Sap | Business Application Software Integrated Solution | 7.30 | All | All | All |
| Application | Sap | Business Application Software Integrated Solution | 7.31 | All | All | All |
| Application | Sap | Business Application Software Integrated Solution | 7.40 | All | All | All |
| Application | Sap | Business Application Software Integrated Solution | All | All | All | All |
| Application | Sap | Business Application Software Integrated Solution | All | All | All | All |
| Application | Sap | Business Application Software Integrated Solution | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| launchpad.support.sap.com | CONFIRM | launchpad.support.sap.com | Permissions Required |
| SAP Security Patch Day – February 2018 | SAP Blogs | CONFIRM | blogs.sap.com | Vendor Advisory |
| SAP ABAP File Interface CVE-2018-2367 Directory Traversal Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.