NVD Vulnerability Detail
Search Exploit, PoC
CVE-2006-0732
Summary

Directory traversal vulnerability in SAP Business Connector (BC) 4.6 and 4.7 allows remote attackers to read or delete arbitrary files via the fullName parameter to (1) sapbc/SAP/chopSAPLog.dsp or (2) invoke/sap.monitor.rfcTrace/deleteSingle. Details will be updated after the grace period has ended. NOTE: SAP Business Connector is an OEM version of webMethods Integration Server. webMethods states that this issue can only occur when the product is installed as root/admin, and if the attacker has access to a general purpose port; however, both are discouraged in the documentation. In addition, the attacker must already have acquired administrative privileges through other means.

Summary

Apply patches (see SAP note 906401 and 908349).

Publication Date Feb. 16, 2006, 8:02 p.m.
Registration Date Jan. 29, 2021, 3:31 p.m.
Last Update Oct. 20, 2018, 12:45 a.m.
CVSS2.0 : MEDIUM
Score 6.4
Vector AV:N/AC:L/Au:N/C:P/I:P/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C)
完全性への影響(I)
可用性への影響(A) なし
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:sap:business_connector:4.6:*:*:*:*:*:*:*
cpe:2.3:a:sap:business_connector:4.7:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List