Directory traversal vulnerability in wgate.dll for SAP Internet Transaction Server (ITS) 4620.2.0.323011 allows remote attackers to read arbitrary files via ..\ (dot-dot backslash) sequences in the ~theme parameter and a ~template parameter with a filename followed by space characters, which can prevent SAP from effectively adding a .html extension to the filename.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2003-08/0361.html | mailing list exploit vendor advisory |
http://www.securityfocus.com/bid/8516 | exploit vdb entry vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/13066 | vdb entry |