gsd-2023-49058
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
SAP Master Data Governance File Upload application allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing ‘traverse to parent directory’ are passed through to the file APIs. As a result, it has a low impact to the confidentiality.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2023-49058", "id": "GSD-2023-49058" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2023-49058" ], "details": "SAP Master Data Governance File Upload application\u00a0allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing \u2018traverse to parent directory\u2019 are passed through to the file\u00a0APIs. As a result, it has a low impact to the\u00a0confidentiality.\n\n", "id": "GSD-2023-49058", "modified": "2023-12-13T01:20:35.149416Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cna@sap.com", "ID": "CVE-2023-49058", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "SAP Master Data Governance", "version": { "version_data": [ { "version_affected": "=", "version_value": "MDG_FND 731" }, { "version_affected": "=", "version_value": "MDG_FND 732" }, { "version_affected": "=", "version_value": "MDG_FND 746" }, { "version_affected": "=", "version_value": "MDG_FND 747" }, { "version_affected": "=", "version_value": "MDG_FND 748" }, { "version_affected": "=", "version_value": "MDG_FND 749" }, { "version_affected": "=", "version_value": "MDG_FND 752" }, { "version_affected": "=", "version_value": "MDG_FND 800" }, { "version_affected": "=", "version_value": "MDG_FND 802" }, { "version_affected": "=", "version_value": "MDG_FND 803" }, { "version_affected": "=", "version_value": "MDG_FND 804" }, { "version_affected": "=", "version_value": "MDG_FND 805" }, { "version_affected": "=", "version_value": "MDG_FND 806" }, { "version_affected": "=", "version_value": "MDG_FND 807" }, { "version_affected": "=", "version_value": "MDG_FND 808" }, { "version_affected": "=", "version_value": "SAP_BS_FND 702" } ] } } ] }, "vendor_name": "SAP_SE" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "SAP Master Data Governance File Upload application\u00a0allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing \u2018traverse to parent directory\u2019 are passed through to the file\u00a0APIs. As a result, it has a low impact to the\u00a0confidentiality.\n\n" } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "impact": { "cvss": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-22", "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal)" } ] } ] }, "references": { "reference_data": [ { "name": "https://me.sap.com/notes/3363690", "refsource": "MISC", "url": "https://me.sap.com/notes/3363690" }, { "name": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html", "refsource": "MISC", "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ] }, "source": { "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sap:master_data_governance:731:*:*:*:*:*:*:*", "matchCriteriaId": "21F2D97C-922D-420D-8B1C-689D2C20FEB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:732:*:*:*:*:*:*:*", "matchCriteriaId": "FD747826-9538-4A22-AFA8-BB5CFBDE6BF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:746:*:*:*:*:*:*:*", "matchCriteriaId": "FD6CBD8D-BC8E-496A-A17C-0E2413D02FC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:747:*:*:*:*:*:*:*", "matchCriteriaId": "3DF73CAE-700A-4663-BC79-CAB6CCE936F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:748:*:*:*:*:*:*:*", "matchCriteriaId": "4E09AA46-4347-4B6C-8BE1-B943B19ECB5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:749:*:*:*:*:*:*:*", "matchCriteriaId": "4222EE28-3865-4943-8F7A-2A656293FEAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:751:*:*:*:*:*:*:*", "matchCriteriaId": "17AD00E5-3EED-433C-8341-EF3535C0A316", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:752:*:*:*:*:*:*:*", "matchCriteriaId": "725B3570-302B-4B4E-93BD-4A99488D1B2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:800:*:*:*:*:*:*:*", "matchCriteriaId": "325FE86D-E0E6-46B3-8BBB-ED93A34E17C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:801:*:*:*:*:*:*:*", "matchCriteriaId": "B86D04DD-5013-4769-9E62-32A1C4A7F9A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:802:*:*:*:*:*:*:*", "matchCriteriaId": "7895D7F0-A62E-469B-8FE6-7967D74AE202", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:803:*:*:*:*:*:*:*", "matchCriteriaId": "9F5AB22A-7906-40EE-A613-09C43B1B4D63", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:804:*:*:*:*:*:*:*", "matchCriteriaId": "1833975C-797D-45E1-984D-E1900553FFBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:805:*:*:*:*:*:*:*", "matchCriteriaId": "02340ACE-A07B-40FC-B253-17A64F4D8328", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:806:*:*:*:*:*:*:*", "matchCriteriaId": "E6CD28E7-6576-470F-8421-CEA4E2B89D18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:807:*:*:*:*:*:*:*", "matchCriteriaId": "36F5BCA7-C447-425B-A828-D59FCDEBA136", "vulnerable": true }, { "criteria": "cpe:2.3:a:sap:master_data_governance:808:*:*:*:*:*:*:*", "matchCriteriaId": "93C11998-6A74-44E0-8CCF-4A48B71AF3C7", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "SAP Master Data Governance File Upload application\u00a0allows an attacker to exploit insufficient validation of path information provided by users, thus characters representing \u2018traverse to parent directory\u2019 are passed through to the file\u00a0APIs. As a result, it has a low impact to the\u00a0confidentiality.\n\n" }, { "lang": "es", "value": "La aplicaci\u00f3n SAP Master Data Governance File Upload permite a un atacante aprovechar la validaci\u00f3n insuficiente de la informaci\u00f3n de ruta proporcionada por los usuarios, por lo que los caracteres que representan \"viajar al directorio principal\" se pasan a las API del archivo. Como resultado, tiene un bajo impacto en la confidencialidad." } ], "id": "CVE-2023-49058", "lastModified": "2023-12-14T18:56:27.277", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "cna@sap.com", "type": "Secondary" } ] }, "published": "2023-12-12T01:15:12.840", "references": [ { "source": "cna@sap.com", "tags": [ "Permissions Required" ], "url": "https://me.sap.com/notes/3363690" }, { "source": "cna@sap.com", "tags": [ "Vendor Advisory" ], "url": "https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html" } ], "sourceIdentifier": "cna@sap.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "cna@sap.com", "type": "Primary" } ] } } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.