Schweregrad:: Mittel
  CVE Kennungen:: CVE-2006-0732
  Hinweisdatum: 15 Februar 2011

  Beschreibung

 Directory traversal vulnerability in SAP Business Connector (BC) 4.6 and 4.7 allows remote attackers to read or delete arbitrary files via the the fullName parameter to (1) sapbc/SAP/chopSAPLog.dsp or (2) invoke/sap.monitor.rfcTrace/deleteSingle.  Details will be updated after the grace period has ended.  NOTE: SAP Business Connector is an OEM version of webMethods Integration Server.  webMethods states that this issue can only occur when the product is installed as root/admin, and if the attacker has access to a general purpose port; however, both are discouraged in the documentation.  In addition, the attacker must already have acquired administrative privileges through other means.

  Trend Micro Lösungen

Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.

  Lösungen

  Trend Micro Deep Security DPI Rule Number: 1002483
  Trend Micro Deep Security DPI Rule Name: 1002483 - SAP Business Connector Remote Arbitrary File Access And Deletion Vulnerability

  Betroffene Software und Version:

  • SAP Business Connector 4.6
  • SAP Business Connector 4.7