CVE-2020-6203
Summary
| CVE | CVE-2020-6203 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-03-10 21:15:00 UTC |
| Updated | 2020-03-12 16:14:00 UTC |
| Description | SAP NetWeaver UDDI Server (Services Registry), versions- 7.10, 7.11, 7.20, 7.30, 7.31, 7.40, 7.50; allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing 'traverse to parent directory' are passed through to the file APIs, leading to Path Traversal. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Sap | Netweaver | 7.10 | All | All | All |
| Application | Sap | Netweaver | 7.11 | All | All | All |
| Application | Sap | Netweaver | 7.20 | All | All | All |
| Application | Sap | Netweaver | 7.30 | All | All | All |
| Application | Sap | Netweaver | 7.31 | All | All | All |
| Application | Sap | Netweaver | 7.40 | All | All | All |
| Application | Sap | Netweaver | 7.50 | All | All | All |
| Application | Sap | Netweaver | 7.10 | All | All | All |
| Application | Sap | Netweaver | 7.11 | All | All | All |
| Application | Sap | Netweaver | 7.20 | All | All | All |
| Application | Sap | Netweaver | 7.30 | All | All | All |
| Application | Sap | Netweaver | 7.31 | All | All | All |
| Application | Sap | Netweaver | 7.40 | All | All | All |
| Application | Sap | Netweaver | 7.50 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| launchpad.support.sap.com | MISC | launchpad.support.sap.com | Permissions Required |
| SAP Security Patch Day – March 2020 - Product Security Response at SAP - Community Wiki | MISC | wiki.scn.sap.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.