SAP Business Connector Remote Arbitrary File Access And Deletion Vulnerability
Publish Date: 15 Februar 2011
Schweregrad:: Mittel
CVE Kennungen:: CVE-2006-0732
Hinweisdatum: 15 Februar 2011
Beschreibung
Directory traversal vulnerability in SAP Business Connector (BC) 4.6 and 4.7 allows remote attackers to read or delete arbitrary files via the the fullName parameter to (1) sapbc/SAP/chopSAPLog.dsp or (2) invoke/sap.monitor.rfcTrace/deleteSingle. Details will be updated after the grace period has ended. NOTE: SAP Business Connector is an OEM version of webMethods Integration Server. webMethods states that this issue can only occur when the product is installed as root/admin, and if the attacker has access to a general purpose port; however, both are discouraged in the documentation. In addition, the attacker must already have acquired administrative privileges through other means.
Trend Micro Lösungen
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Lösungen
Trend Micro Deep Security DPI Rule Number: 1002483
Trend Micro Deep Security DPI Rule Name: 1002483 - SAP Business Connector Remote Arbitrary File Access And Deletion Vulnerability
Betroffene Software und Version:
- SAP Business Connector 4.6
- SAP Business Connector 4.7