CVE-2023-49058 (GCVE-0-2023-49058)

Vulnerability from cvelistv5 – Published: 2023-12-12 01:01 – Updated: 2024-08-02 21:46
VLAI?
Summary
SAP Master Data Governance File Upload application allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs. As a result, it has a low impact to the confidentiality.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal)
Assigner
sap
Impacted products
Vendor Product Version
SAP_SE SAP Master Data Governance Affected: MDG_FND 731
Affected: MDG_FND 732
Affected: MDG_FND 746
Affected: MDG_FND 747
Affected: MDG_FND 748
Affected: MDG_FND 749
Affected: MDG_FND 752
Affected: MDG_FND 800
Affected: MDG_FND 802
Affected: MDG_FND 803
Affected: MDG_FND 804
Affected: MDG_FND 805
Affected: MDG_FND 806
Affected: MDG_FND 807
Affected: MDG_FND 808
Affected: SAP_BS_FND 702
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T21:46:29.250Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://me.sap.com/notes/3363690"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "SAP Master Data Governance",
          "vendor": "SAP_SE",
          "versions": [
            {
              "status": "affected",
              "version": "MDG_FND 731"
            },
            {
              "status": "affected",
              "version": "MDG_FND 732"
            },
            {
              "status": "affected",
              "version": "MDG_FND 746"
            },
            {
              "status": "affected",
              "version": "MDG_FND 747"
            },
            {
              "status": "affected",
              "version": "MDG_FND 748"
            },
            {
              "status": "affected",
              "version": "MDG_FND 749"
            },
            {
              "status": "affected",
              "version": "MDG_FND 752"
            },
            {
              "status": "affected",
              "version": "MDG_FND 800"
            },
            {
              "status": "affected",
              "version": "MDG_FND 802"
            },
            {
              "status": "affected",
              "version": "MDG_FND 803"
            },
            {
              "status": "affected",
              "version": "MDG_FND 804"
            },
            {
              "status": "affected",
              "version": "MDG_FND 805"
            },
            {
              "status": "affected",
              "version": "MDG_FND 806"
            },
            {
              "status": "affected",
              "version": "MDG_FND 807"
            },
            {
              "status": "affected",
              "version": "MDG_FND 808"
            },
            {
              "status": "affected",
              "version": "SAP_BS_FND 702"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eSAP Master Data Governance File Upload application\u00a0allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing \u2018traverse to parent directory\u2019 are passed through to the file\u00a0APIs. As a result, it has a low impact to the\u00a0confidentiality.\u003c/p\u003e"
            }
          ],
          "value": "SAP Master Data Governance File Upload application\u00a0allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing \u2018traverse to parent directory\u2019 are passed through to the file\u00a0APIs. As a result, it has a low impact to the\u00a0confidentiality.\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal)",
              "lang": "eng",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-12T01:01:07.964Z",
        "orgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
        "shortName": "sap"
      },
      "references": [
        {
          "url": "https://me.sap.com/notes/3363690"
        },
        {
          "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Directory Traversal vulnerability in SAP Master Data Governance",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "e4686d1a-f260-4930-ac4c-2f5c992778dd",
    "assignerShortName": "sap",
    "cveId": "CVE-2023-49058",
    "datePublished": "2023-12-12T01:01:07.964Z",
    "dateReserved": "2023-11-20T11:31:43.313Z",
    "dateUpdated": "2024-08-02T21:46:29.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:731:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21F2D97C-922D-420D-8B1C-689D2C20FEB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:732:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD747826-9538-4A22-AFA8-BB5CFBDE6BF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:746:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD6CBD8D-BC8E-496A-A17C-0E2413D02FC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:747:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DF73CAE-700A-4663-BC79-CAB6CCE936F3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:748:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E09AA46-4347-4B6C-8BE1-B943B19ECB5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:749:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4222EE28-3865-4943-8F7A-2A656293FEAE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:751:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"17AD00E5-3EED-433C-8341-EF3535C0A316\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:752:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"725B3570-302B-4B4E-93BD-4A99488D1B2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:800:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"325FE86D-E0E6-46B3-8BBB-ED93A34E17C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:801:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B86D04DD-5013-4769-9E62-32A1C4A7F9A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:802:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7895D7F0-A62E-469B-8FE6-7967D74AE202\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:803:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F5AB22A-7906-40EE-A613-09C43B1B4D63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:804:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1833975C-797D-45E1-984D-E1900553FFBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:805:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02340ACE-A07B-40FC-B253-17A64F4D8328\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:806:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6CD28E7-6576-470F-8421-CEA4E2B89D18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:807:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36F5BCA7-C447-425B-A828-D59FCDEBA136\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:sap:master_data_governance:808:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"93C11998-6A74-44E0-8CCF-4A48B71AF3C7\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"SAP Master Data Governance File Upload application\\u00a0allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing \\u2018traverse to parent directory\\u2019 are passed through to the file\\u00a0APIs. As a result, it has a low impact to the\\u00a0confidentiality.\\n\\n\"}, {\"lang\": \"es\", \"value\": \"La aplicaci\\u00f3n SAP Master Data Governance File Upload permite a un atacante aprovechar la validaci\\u00f3n insuficiente de la informaci\\u00f3n de ruta proporcionada por los usuarios, por lo que los caracteres que representan \\\"viajar al directorio principal\\\" se pasan a las API del archivo. Como resultado, tiene un bajo impacto en la confidencialidad.\"}]",
      "id": "CVE-2023-49058",
      "lastModified": "2024-11-21T08:32:44.870",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"cna@sap.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N\", \"baseScore\": 3.5, \"baseSeverity\": \"LOW\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}]}",
      "published": "2023-12-12T01:15:12.840",
      "references": "[{\"url\": \"https://me.sap.com/notes/3363690\", \"source\": \"cna@sap.com\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html\", \"source\": \"cna@sap.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://me.sap.com/notes/3363690\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Permissions Required\"]}, {\"url\": \"https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "cna@sap.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"cna@sap.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-49058\",\"sourceIdentifier\":\"cna@sap.com\",\"published\":\"2023-12-12T01:15:12.840\",\"lastModified\":\"2024-11-21T08:32:44.870\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SAP Master Data Governance File Upload application\u00a0allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing \u2018traverse to parent directory\u2019 are passed through to the file\u00a0APIs. As a result, it has a low impact to the\u00a0confidentiality.\\n\\n\"},{\"lang\":\"es\",\"value\":\"La aplicaci\u00f3n SAP Master Data Governance File Upload permite a un atacante aprovechar la validaci\u00f3n insuficiente de la informaci\u00f3n de ruta proporcionada por los usuarios, por lo que los caracteres que representan \\\"viajar al directorio principal\\\" se pasan a las API del archivo. Como resultado, tiene un bajo impacto en la confidencialidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cna@sap.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N\",\"baseScore\":3.5,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"cna@sap.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:731:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21F2D97C-922D-420D-8B1C-689D2C20FEB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:732:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD747826-9538-4A22-AFA8-BB5CFBDE6BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:746:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD6CBD8D-BC8E-496A-A17C-0E2413D02FC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:747:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DF73CAE-700A-4663-BC79-CAB6CCE936F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:748:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E09AA46-4347-4B6C-8BE1-B943B19ECB5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:749:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4222EE28-3865-4943-8F7A-2A656293FEAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:751:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17AD00E5-3EED-433C-8341-EF3535C0A316\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:752:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"725B3570-302B-4B4E-93BD-4A99488D1B2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:800:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"325FE86D-E0E6-46B3-8BBB-ED93A34E17C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:801:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B86D04DD-5013-4769-9E62-32A1C4A7F9A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:802:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7895D7F0-A62E-469B-8FE6-7967D74AE202\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:803:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F5AB22A-7906-40EE-A613-09C43B1B4D63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:804:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1833975C-797D-45E1-984D-E1900553FFBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:805:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02340ACE-A07B-40FC-B253-17A64F4D8328\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:806:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6CD28E7-6576-470F-8421-CEA4E2B89D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:807:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36F5BCA7-C447-425B-A828-D59FCDEBA136\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sap:master_data_governance:808:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93C11998-6A74-44E0-8CCF-4A48B71AF3C7\"}]}]}],\"references\":[{\"url\":\"https://me.sap.com/notes/3363690\",\"source\":\"cna@sap.com\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html\",\"source\":\"cna@sap.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://me.sap.com/notes/3363690\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…