Directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS in SAP NetWeaver Application Server Java 7.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the query string, as exploited in the wild in August 2017, aka SAP Security Note 2486657.
References
Link | Resource |
---|---|
https://web.archive.org/web/20170807202056/http://www.sh0w.top/index.php/archives/7/ | Third Party Advisory |
Configurations
History
03 Apr 2025, 20:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://web.archive.org/web/20170807202056/http://www.sh0w.top/index.php/archives/7/ - Third Party Advisory |
27 Mar 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-08-07 20:29
Updated : 2025-04-20 01:37
NVD link : CVE-2017-12637
Mitre link : CVE-2017-12637
CVE.ORG link : CVE-2017-12637
JSON object : View
Products Affected
sap
- netweaver_application_server_java
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')