First published: Wed Jun 27 2001(Updated: )
saposcol in SAP R/3 Web Application Server Demo before 1.5 trusts the PATH environmental variable to find and execute the expand program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse expand program.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SAP Web Application Server | <=1.5 | |
SAP Saposcol | =1.0 | |
SAP Saposcol | =1.1 | |
SAP Saposcol | =1.2 | |
SAP Saposcol | =1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0366 is classified as a severe vulnerability due to its ability to grant root access to local users.
To fix CVE-2001-0366, ensure that the PATH variable is not manipulated by untrusted users and upgrade to a patched version of the software.
CVE-2001-0366 impacts SAP R/3 Web Application Server Demo versions up to 1.5 and SAP Saposcol versions 1.0 through 1.3.
CVE-2001-0366 requires local access to be exploited, making it less of a threat from remote attackers.
Leaving CVE-2001-0366 unpatched poses a significant risk as it allows local users to gain root access and potentially compromise the entire system.