ID CVE-2006-0732
Summary Directory traversal vulnerability in SAP Business Connector (BC) 4.6 and 4.7 allows remote attackers to read or delete arbitrary files via the fullName parameter to (1) sapbc/SAP/chopSAPLog.dsp or (2) invoke/sap.monitor.rfcTrace/deleteSingle. Details will be updated after the grace period has ended. NOTE: SAP Business Connector is an OEM version of webMethods Integration Server. webMethods states that this issue can only occur when the product is installed as root/admin, and if the attacker has access to a general purpose port; however, both are discouraged in the documentation. In addition, the attacker must already have acquired administrative privileges through other means. Apply patches (see SAP note 906401 and 908349).
References
Vulnerable Configurations
  • cpe:2.3:a:sap:business_connector:4.6:*:*:*:*:*:*:*
    cpe:2.3:a:sap:business_connector:4.6:*:*:*:*:*:*:*
  • cpe:2.3:a:sap:business_connector:4.7:*:*:*:*:*:*:*
    cpe:2.3:a:sap:business_connector:4.7:*:*:*:*:*:*:*
CVSS
Base: 6.4 (as of 19-10-2018 - 15:45)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:N
refmap via4
bid 16668
bugtraq
  • 20060215 CYBSEC - Security Pre-Advisory: Arbitrary File Read/Delete in SAPBC
  • 20060515 CYBSEC - Security Advisory: Arbitrary File Read/Delete in SAP BC(Business Connector)
misc
sectrack
  • 1015639
  • 1016090
  • 1016122
secunia 18880
vupen ADV-2006-0611
Last major update 19-10-2018 - 15:45
Published 16-02-2006 - 11:02
Last modified 19-10-2018 - 15:45
Back to Top