Vulnerabilites related to SAP_SE - SAP Master Data Governance
cve-2023-49058
Vulnerability from cvelistv5
Published
2023-12-12 01:01
Modified
2024-08-02 21:46
Summary
SAP Master Data Governance File Upload application allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs. As a result, it has a low impact to the confidentiality.
Impacted products
Vendor Product Version
SAP_SE SAP Master Data Governance Version: MDG_FND 731
Version: MDG_FND 732
Version: MDG_FND 746
Version: MDG_FND 747
Version: MDG_FND 748
Version: MDG_FND 749
Version: MDG_FND 752
Version: MDG_FND 800
Version: MDG_FND 802
Version: MDG_FND 803
Version: MDG_FND 804
Version: MDG_FND 805
Version: MDG_FND 806
Version: MDG_FND 807
Version: MDG_FND 808
Version: SAP_BS_FND 702
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T21:46:29.250Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://me.sap.com/notes/3363690",
               },
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "SAP Master Data Governance",
               vendor: "SAP_SE",
               versions: [
                  {
                     status: "affected",
                     version: "MDG_FND 731",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 732",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 746",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 747",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 748",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 749",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 752",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 800",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 802",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 803",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 804",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 805",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 806",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 807",
                  },
                  {
                     status: "affected",
                     version: "MDG_FND 808",
                  },
                  {
                     status: "affected",
                     version: "SAP_BS_FND 702",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<p>SAP Master Data Governance File Upload application allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs. As a result, it has a low impact to the confidentiality.</p>",
                  },
               ],
               value: "SAP Master Data Governance File Upload application allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs. As a result, it has a low impact to the confidentiality.\n\n",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 3.5,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "CHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-22",
                     description: "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal)",
                     lang: "eng",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2023-12-12T01:01:07.964Z",
            orgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
            shortName: "sap",
         },
         references: [
            {
               url: "https://me.sap.com/notes/3363690",
            },
            {
               url: "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         title: "Directory Traversal vulnerability in SAP Master Data Governance",
         x_generator: {
            engine: "Vulnogram 0.1.0-dev",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "e4686d1a-f260-4930-ac4c-2f5c992778dd",
      assignerShortName: "sap",
      cveId: "CVE-2023-49058",
      datePublished: "2023-12-12T01:01:07.964Z",
      dateReserved: "2023-11-20T11:31:43.313Z",
      dateUpdated: "2024-08-02T21:46:29.250Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}