SAF-T Framework Transaction SAFTN_G allows an attacker to exploit insufficient validation of path information provided by normal user, leading to full server directory access. The attacker can see the whole filesystem structure but cannot overwrite, delete, or corrupt arbitrary files on the server.
                
            References
                    | Link | Resource | 
|---|---|
| https://launchpad.support.sap.com/#/notes/3124094 | Vendor Advisory | 
| https://wiki.scn.sap.com/wiki/display/PSR/SAP+Security+Patch+Day+-+December+2021 | Permissions Required Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Information
                Published : 2021-12-14 08:15
Updated : 2021-12-22 07:17
NVD link : CVE-2021-44232
Mitre link : CVE-2021-44232
JSON object : View
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
                sap
- saf-t_framework


