Search criteria
2 vulnerabilities found for SAP Master Data Governance by SAP_SE
CVE-2023-49058 (GCVE-0-2023-49058)
Vulnerability from cvelistv5 – Published: 2023-12-12 01:01 – Updated: 2024-08-02 21:46
VLAI?
Summary
SAP Master Data Governance File Upload application allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs. As a result, it has a low impact to the confidentiality.
Severity ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| SAP_SE | SAP Master Data Governance |
Affected:
MDG_FND 731
Affected: MDG_FND 732 Affected: MDG_FND 746 Affected: MDG_FND 747 Affected: MDG_FND 748 Affected: MDG_FND 749 Affected: MDG_FND 752 Affected: MDG_FND 800 Affected: MDG_FND 802 Affected: MDG_FND 803 Affected: MDG_FND 804 Affected: MDG_FND 805 Affected: MDG_FND 806 Affected: MDG_FND 807 Affected: MDG_FND 808 Affected: SAP_BS_FND 702 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T21:46:29.250Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://me.sap.com/notes/3363690"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "SAP Master Data Governance",
"vendor": "SAP_SE",
"versions": [
{
"status": "affected",
"version": "MDG_FND 731"
},
{
"status": "affected",
"version": "MDG_FND 732"
},
{
"status": "affected",
"version": "MDG_FND 746"
},
{
"status": "affected",
"version": "MDG_FND 747"
},
{
"status": "affected",
"version": "MDG_FND 748"
},
{
"status": "affected",
"version": "MDG_FND 749"
},
{
"status": "affected",
"version": "MDG_FND 752"
},
{
"status": "affected",
"version": "MDG_FND 800"
},
{
"status": "affected",
"version": "MDG_FND 802"
},
{
"status": "affected",
"version": "MDG_FND 803"
},
{
"status": "affected",
"version": "MDG_FND 804"
},
{
"status": "affected",
"version": "MDG_FND 805"
},
{
"status": "affected",
"version": "MDG_FND 806"
},
{
"status": "affected",
"version": "MDG_FND 807"
},
{
"status": "affected",
"version": "MDG_FND 808"
},
{
"status": "affected",
"version": "SAP_BS_FND 702"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eSAP Master Data Governance File Upload application\u00a0allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing \u2018traverse to parent directory\u2019 are passed through to the file\u00a0APIs. As a result, it has a low impact to the\u00a0confidentiality.\u003c/p\u003e"
}
],
"value": "SAP Master Data Governance File Upload application\u00a0allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing \u2018traverse to parent directory\u2019 are passed through to the file\u00a0APIs. As a result, it has a low impact to the\u00a0confidentiality.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal)",
"lang": "eng",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-12T01:01:07.964Z",
"orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
"shortName": "sap"
},
"references": [
{
"url": "https://me.sap.com/notes/3363690"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Directory Traversal vulnerability in SAP Master Data Governance",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
"assignerShortName": "sap",
"cveId": "CVE-2023-49058",
"datePublished": "2023-12-12T01:01:07.964Z",
"dateReserved": "2023-11-20T11:31:43.313Z",
"dateUpdated": "2024-08-02T21:46:29.250Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-49058 (GCVE-0-2023-49058)
Vulnerability from nvd – Published: 2023-12-12 01:01 – Updated: 2024-08-02 21:46
VLAI?
Summary
SAP Master Data Governance File Upload application allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs. As a result, it has a low impact to the confidentiality.
Severity ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| SAP_SE | SAP Master Data Governance |
Affected:
MDG_FND 731
Affected: MDG_FND 732 Affected: MDG_FND 746 Affected: MDG_FND 747 Affected: MDG_FND 748 Affected: MDG_FND 749 Affected: MDG_FND 752 Affected: MDG_FND 800 Affected: MDG_FND 802 Affected: MDG_FND 803 Affected: MDG_FND 804 Affected: MDG_FND 805 Affected: MDG_FND 806 Affected: MDG_FND 807 Affected: MDG_FND 808 Affected: SAP_BS_FND 702 |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T21:46:29.250Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://me.sap.com/notes/3363690"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "SAP Master Data Governance",
"vendor": "SAP_SE",
"versions": [
{
"status": "affected",
"version": "MDG_FND 731"
},
{
"status": "affected",
"version": "MDG_FND 732"
},
{
"status": "affected",
"version": "MDG_FND 746"
},
{
"status": "affected",
"version": "MDG_FND 747"
},
{
"status": "affected",
"version": "MDG_FND 748"
},
{
"status": "affected",
"version": "MDG_FND 749"
},
{
"status": "affected",
"version": "MDG_FND 752"
},
{
"status": "affected",
"version": "MDG_FND 800"
},
{
"status": "affected",
"version": "MDG_FND 802"
},
{
"status": "affected",
"version": "MDG_FND 803"
},
{
"status": "affected",
"version": "MDG_FND 804"
},
{
"status": "affected",
"version": "MDG_FND 805"
},
{
"status": "affected",
"version": "MDG_FND 806"
},
{
"status": "affected",
"version": "MDG_FND 807"
},
{
"status": "affected",
"version": "MDG_FND 808"
},
{
"status": "affected",
"version": "SAP_BS_FND 702"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eSAP Master Data Governance File Upload application\u00a0allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing \u2018traverse to parent directory\u2019 are passed through to the file\u00a0APIs. As a result, it has a low impact to the\u00a0confidentiality.\u003c/p\u003e"
}
],
"value": "SAP Master Data Governance File Upload application\u00a0allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing \u2018traverse to parent directory\u2019 are passed through to the file\u00a0APIs. As a result, it has a low impact to the\u00a0confidentiality.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal)",
"lang": "eng",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-12T01:01:07.964Z",
"orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
"shortName": "sap"
},
"references": [
{
"url": "https://me.sap.com/notes/3363690"
},
{
"url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Directory Traversal vulnerability in SAP Master Data Governance",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
"assignerShortName": "sap",
"cveId": "CVE-2023-49058",
"datePublished": "2023-12-12T01:01:07.964Z",
"dateReserved": "2023-11-20T11:31:43.313Z",
"dateUpdated": "2024-08-02T21:46:29.250Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}