SAP NetWeaver AS JAVA, versions - 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker who is authenticated as an administrator to use the administrator console, to expose unauthenticated access to the file system and upload a malicious file. The attacker or another user can then use a separate mechanism to execute OS commands through the uploaded file leading to Privilege Escalation and completely compromise the confidentiality, integrity and availability of the server operating system and any application running on it.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/162086/SAP-Java-OS-Remote-Code-Execution.html | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2021/Apr/7 | Mailing List Third Party Advisory |
https://launchpad.support.sap.com/#/notes/2979062 | Permissions Required Vendor Advisory |
https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=562725571 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: sap
Published: 2020-11-10T16:14:04
Updated: 2021-04-06T15:06:18
Reserved: 2020-10-07T00:00:00
Link: CVE-2020-26820
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-11-10T17:15:14.173
Modified: 2022-01-01T18:18:22.327
Link: CVE-2020-26820
JSON object: View
Redhat Information
No data.
CWE