#VU7695 Path traversal in SAP NetWeaver - CVE-2017-12637
Published: August 7, 2017 / Updated: August 8, 2017
Vulnerability identifier: #VU7695
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2017-12637
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability:
The vulnerability is being exploited in the wild
Vulnerable software:
SAP NetWeaver
SAP NetWeaver
Software vendor:
SAP
SAP
Description
The vulnerability allows a remote attacker to read arbitrary files on the vulnerable system.
The vulnerability exists due to improper input validation in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS component in SAP NetWeaver Application Server Java 7.5. A remote unauthenticated attacker can use directory traversal sequences (e.g. "../") to read contents of arbitrary file on vulnerable system.
Successful exploitation of this vulnerability may allow an attacker to gain acces to potentially sensitive information.
Note: there are reports that this vulnerability is being active exploited in the wild in August 2017.
The vulnerability exists due to improper input validation in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS component in SAP NetWeaver Application Server Java 7.5. A remote unauthenticated attacker can use directory traversal sequences (e.g. "../") to read contents of arbitrary file on vulnerable system.
Successful exploitation of this vulnerability may allow an attacker to gain acces to potentially sensitive information.
Note: there are reports that this vulnerability is being active exploited in the wild in August 2017.
Remediation
Cybersecurity Help is currenlty unaware of any official solution to address this vulnerability.