CVE-2020-6225Path Traversal in SE SAP Netweaver

CWE-22Path Traversal3 documents3 sources
Severity
8.8HIGHNVD
EPSS
0.5%
top 32.43%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 14
Latest updateMay 24

Description

SAP NetWeaver (Knowledge Management), versions (KMC-CM - 7.00, 7.01, 7.02, 7.30, 7.31, 7.40, 7.50 and KMC-WPC 7.30, 7.31, 7.40, 7.50), does not sufficiently validate path information provided by users, thus characters representing traverse to parent directory are passed through to the file APIs, allowing the attacker to overwrite, delete, or corrupt arbitrary files on the remote server, leading to Path Traversal.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-fv4j-jw35-jw4q: SAP NetWeaver (Knowledge Management), versions (KMC-CM - 72022-05-24
CVEList
CVE-2020-6225: SAP NetWeaver (Knowledge Management), versions (KMC-CM - 72020-04-14
CVE-2020-6225 — Path Traversal in SAP SE SAP Netweaver | cvebase