Lucene search

K
ptsecurityPositive TechnologiesPT-2018-44
HistoryMar 16, 2017 - 12:00 a.m.

PT-2018-44: Directory Traversal in SAP Business Process Automation by Redwood

2017-03-1600:00:00
Positive Technologies
www.ptsecurity.com
5

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

30.4%

PT-2018-44: Directory Traversal in SAP Business Process Automation by Redwood

Vulnerable software

SAP Business Process Automation by Redwood
Version: 9.x

Link:
<https://www.sap.com/&gt;

Severity level

Severity level: Medium
Impact: Information disclosure
Access Vector: Remote

CVSS v3:
Base Score: 4.3
Vector: (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

CVE: CVE-2018-2366

Vulnerability description

The specialists of the Positive Research center have detected a Directory Traversal vulnerability in SAP Business Process Automation by Redwood.

A directory traversal vulnerability in SAP Business Process Automation (BPA), due to insufficient validation of path information provided by users, allows attackers to read arbitrary files on the server (including system files) and obtain sensitive information.

How to fix

Use vendor’s advisory:
<https://launchpad.support.sap.com/#/notes/2555667&gt;

Advisory status

16.03.2017 - Vendor gets vulnerability details
13.03.2018 - Vendor releases fixed version and details
26.12.2018 - Public disclosure

Credits

The vulnerability was detected by Alexandr Shvetsov, Positive Research Center (Positive Technologies Company)

References

<http://en.securitylab.ru/lab/PT-2018-44&gt;

Reports on the vulnerabilities previously discovered by Positive Research:

https://www.ptsecurity.com/
<https://en.securitylab.ru/lab/&gt;

About Positive Technologies

Positive Technologies is a leading digital security firm with over 15 years of experience in 360Β° protection of critical IT systems against the most advanced cyberthreats. State-of-the-art solutions are developed at the company’s research centerβ€”one of the largest in Europe. Positive Technologies experts have helped to identify and fix over 250 zero-day vulnerabilities in products from Cisco, Google, Honeywell, Huawei, Microsoft, Oracle, SAP, Schneider Electric, Siemens, and others, earning a reputation for world-class expertise in protection of devices and infrastructures at all scales from ATMs to nuclear power stations. Findings by Positive Technologies researchers are used for updating the MaxPatrol knowledge base and for development of security solutions including PT Application Firewall, PT Application Inspector, MaxPatrol. These products allow securing web applications, evaluating network protection, blocking attacks in real time, ensuring compliance with industry and national standards, and training security specialists. Positive Technologies is the organizer of the annual Positive Hack Days international forum and security competition.

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

30.4%

Related for PT-2018-44